Discussion
Name
Institution
Get a Custom-Written Paper Delivered on Time
Our subject-specialist writers craft plagiarism-free, rubric-matched papers from scratch β serving students in Australia, UK, UAE, Kuwait, Canada & USA.
Discussion
I gained important insights about cryptographic attacks. For instance, I learned that a cryptographic attack is a technique used to circumvent the security of a cryptographic system by identifying a weakness in a code, cryptographic protocol, cipher or key management scheme. As such, in cryptography, the attackerβs goal is to crack the encryptionβs secrecy and study the secret message and, better still, the secret key (Boyd & Mathuria, 2013). I also learned about the different types of cryptographic attacks. Brute-force attacks are a good example. These entail attempting each possible character combination to identify the βkeyβ to decipher an encrypted message. Another good example is the cipher-only attack; in this kind of attack, the attacker is knowledgeable of the ciphertext of different messages which have been encrypted utilizing the same encryption algorithm (Tilborg & Jajodia, 2014). Therefore, the challenge of the attacker is to find the βkeyβ which can then be utilized to decrypt all messages. The known-plaintext attack is also in this list. This is where the attacker is aware of some of the ciphertext and plaintext; he can then find the βkeyβ by reverse engineering and he can decode other messages which utilize a similar βkeyβ and algorithm. Other kinds of cryptographic attacks include man-in-the middle attacks, replay attacks, side channel attacks, chosen plaintext attacks, timing attack; the list is endless. There are several countermeasures that can be used to strengthen the cryptosystem and thus make it harder for an attacker to gain access into the system; this is yet an invaluable insight I got from the lesson. Some of the countermeasures that can be applied include utilizing strong passwords, executing strong cryptosystems with disused encipherment and executing long key spaces (Boyd & Mathuria, 2013).
Global Assignment Help Writers Are Online Right Now
Thousands of students at universities worldwide submit with confidence using our expert writing service. Human-written, Turnitin-safe, on time.
References
Boyd, C., & Mathuria, A. (2013). Protocols for authentication and key establishment. Springer Science & Business Media.
Tilborg, H. C., & Jajodia, S. (2014). Encyclopedia of cryptography and security. Springer Science & Business Media.