Attacks on Encryption Schemes

'CipherDES.java - A Java Implementation of DES' tutorial was cited in a BCS thesis at University of Liverpool in 2005.

The CipherDES.java - A Java Implementation of DES tutorial was cited in a BCS thesis at University of Liverpool in 2005. Note that my Geocities site has been moved to herongyang.com now.

Subject: Attacks on Encryption Schemes
Date: Mar 31, 2005
Source: University of Liverpool
Author: Benjamin Nickolls

Attacks on Encryption Schemes

Supervised by Dr Paul Sant

Honours project submitted to the Department of Computer Science for
BCS degree in (BSc) Computer Science.

Ownership of this report remains with the University of Liverpool.

Acknowledgements

I would like to acknowledge the support of Dr. Paul Sant throughout
the course of this study. His help and occasional prodding kept the
project moving in the face of all adversity.

I would also like to acknowledge the contribution made by Dr. Herong
Yang. Approval for the use of his copy written code enabled the
implementation of the Reduced-Block DES algorithm possible.

Abstract

In today's world of electronic communication secure transmission of
data is a necessity. This dissertation offers a critical appreciation
of modern day cryptosystems and the security that they can or can not
provide. A discussion of cryptography and cryptanalysis provides the
basis for a practical demonstration of two cryptanalytic attacks: An
implementation of the RSA public key system is used to illustrate an
attack developed by Michael Weiner exploiting a class of weak public
keys containing information on the corresponding decryption exponent.
This technique utilises the continued fraction algorithm operating in
O(n) time with respect the size of the modulus. A sixteen-bit,
private key, block cipher similar to that of the DEA is also presented
for the demonstration of a known plaintext, Brute- Force attack
executing a linear search of the key space operating in exponential
time O(2n) (where n is the bit-length of the key). Evaluation of this
software leads to a debate on the implications of future cryptography
and of computer security on a broader level.

Keywords: Cryptanalysis, DES, RSA, Weiner Attack, Brute-Force

Table of Contents

 About This Book

 Reference Citations in 2023

 Reference Citations in 2022

 Reference Citations in 2021

 Reference Citations in 2020

 Reference Citations in 2019

 Reference Citations in 2018

 Reference Citations in 2017

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

Reference Citations in 2005

 Kalkati.net, XML database dump

 com.liferay.portal.service.impl.PortletServiceImpl

 Japanese Chinese Tea Web Sites

 AIProject Log

 Converting GB2312 to UTF-8

 "OK" auf chinesisch gesucht

 Insertion Sort

 tanya ttg open file

 Base64Decoder

 SSL Client Authentication

 Softwaretechnik-Praktikum SS 2005

 How to develop a scanner/disinfector

 JSTL break ? possible

Attacks on Encryption Schemes

 Encoding a C String/Buffer with ASCII Char

 mysql 5alpha stored procedures vs mssql

 Hangul, Chinese characters to Unicode Conversion

 Appunti di Informatica Libera

 Reference Citations in 2004

 Reference Citations in 2003