Classification of Ciphers
نویسنده
چکیده
Certificate This is to certify that the work contained in the thesis entitled Classification of Ciphers, by Pooja Maheshwari, has been carried out under my supervision and that this work has not been submitted elsewhere for a degree. Abstract In cryptanalysis of an unknown cipher first step is to identify the cipher and then to break it. To identify the cipher we need to classify them. Classifying ciphers means identifying the cipher, which has resulted the given ciphertext encrypted by that unknown cipher. In this thesis, classification of classical ciphers was done with very good accuracy. For classification of modern ciphers like DES and IDEA, several schemes have been examined. Slightly positive results were obtained for modern ciphers classification. ii Acknowledgements I would like to express deep gratitude towards my thesis supervisor Dr. Manindra Agrawal, for his excellent guidance and help during my thesis work. He was always available to help, guide, and encourage me. He has always been very patient and understanding. I am also thankful to all the faculty members of Computer Science & Engineering Department for their encouragement, which has brought me to this competent stage. I extend my thanks to the technical staff of the department for their cooperation and help. listening to my thesis problems and making my stay memorable one at IIT-Kanpur without which I would not have cheerfully completed this task. Finally I would like to mention my beloved parents for their love and affection. It is their trust and expectations that drives me always.
منابع مشابه
Stream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملBlock and Stream Cipher Based Cryptographic Algorithms: A Survey
The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other c...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملClassification of Quasigroup-structures with respect to their Cryptographic Properties
Computationally simple but cryptographically strong ciphers play an important role for efficient Computer Security tasks. It is suggested in (Knapskog, 2008) that there is a need for simple cryptographic primitives to implement security in an environment with end users connected with terminals having limited storage and processing power. Constructing ciphers using the algebraic structures of Qu...
متن کاملBinary Additive Counter Stream Ciphers
Although a number of block ciphers have been designed and are available in the public domain, they are usually used in one of the four modes: the cipher block chaining mode, the cipher feedback mode, the output feedback mode, and the counter mode. In all these cases, a stream cipher is actually used, as any block cipher used in any of these modes becomes a stream cipher. Stream ciphers are pref...
متن کامل