Performance Comparison of Cryptanalysis Techniques over DES
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates this requirement. It focuses on either determining the plaintext out of a ciphertext or guessing the key without trying all the possible combinations of key. Since the development of DES (Data Encryption Standard) in 1977 many cryptanalysis methods have been developed and improved to test security provided by it. Two of the widely used techniques are Linear and Differential cryptanalysis. This paper is aimed at comparing the efficiency of these cryptanalysis methods over Brute Force approach based on experimental results carried out on S-DES. The performances of these methods are compared based on time required for guessing the actual key.
Authors and Affiliations
Anupam Kumar, Aman Kumar, Sahil Jain, P Kiranmai
Stock Market Price Trend Forecasting using Machine Learning
support vector machine is a machine learning technique used in to forecast stock prices. Stock market price forecasting is the process of determining the future value of a company’s stock. This study uses daily closing...
Cloud Computing Challenges and Its Models
The cloud computing is the fastest growing concept in research and industry. The ‘Cloud’ represents the internet and it related to several technologies and the convergence of various technologies has emerged to be call...
Automatic Power Factor Correction using Microcontroller
The main aim of this project is to enhance the power quality by constantly monitoring the load p.f. , when the load p.f. drops below a definite value it results in the rise of line current resulting in more line loss an...
Wireless Induction Charging Of an Electric Propulsion System
The ultimate aim of this project is to develop an induction charging system for a quad copter which enables it to charge the batteries wirelessly. It does not involve any man power thus making the UAV fully autonomous....
Site Locating and Insite Exploring Smart Crawers For Deep Web Interfaces
Mobile Android applications typically have access to sensitive knowledge and resources on the user device. Misuse of this knowledge by malicious applications could result in privacy breaches and sensitive data outpourin...