A Survey Report on Various Cryptanalysis Techniques
Ashish Kumar Kendhe1, Himani Agrawal2
1Ashish Kumar Kendhe, Department of Electronics & Telecommunication, Csvtu/ Sscet/ Sscet, Bhilai, India.
2Himani Agrawal, Department of Electronics & Telecommunication, Csvtu/ Sscet/ Sscet, Bhilai, India.
Manuscript received on April 04, 2013. | Revised Manuscript received on April 28, 2013. | Manuscript published on May 05, 2013. | PP: 287-293 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1534053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This paper mainly focuses on various types of attacks on symmetric cipher & asymmetric cipher .In this paper we tried to describe the existing cryptanalytic attacks on various ciphers and countermeasures to these attacks have been suggested on the basis of information available to attacker ,computational time requirements and memory requirements etc . In order to develop a new secure cipher, it is very necessary that these attacks should be taken into consideration during development and countermeasures of these attacks should be applied in the design, so that the new design is not vulnerable to these attacks. It will also facilitate the security analysis of the existing ciphers and provide an opportunity to understand the requirements for developing a secure and efficient cipher design. This paper surveys about various cryptanalysis techniques for image encryption schemes ,public key cryptosystems ,various encryption standards such as AES ,DES,RSA etc and then tries to suggest some points to improve the level of security .
Keywords: Cipher, cryptanalysis, cryptanalyst, cryptography.