Monday, May 2, 2016

Statistical Attack

Statistical attacks exploit statistical weaknesses in a cryptosystem, such as the inability to produce true random numbers or floating point errors caused by the CPU.
Other types of attacks focus on the hashing algorithms. This type of attack attempts to discover which two messages will result in the same hash values. This is known as the birthday attack.
resources: 
http://www.utilizewindows.com/examples-of-cryptographic-attacks/

4 comments:

  1. useful site explains Cryptography https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography

    Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
    Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographer

    Modern cryptography concerns itself with the following four objectives:

    1) Confidentiality (the information cannot be understood by anyone for whom it was unintended)

    2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected)

    3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information)

    4) Authentication (the sender and receiver can confirm each other?s identity and the origin/destination of the information)

    source
    http://searchsoftwarequality.techtarget.com/definition/cryptography

    ReplyDelete
  2. This was new. although short, it was a great help.

    ReplyDelete
  3. Thank you. I wish you added more information about Statistical attack.

    ReplyDelete
  4. it would've been nice if you mentioned other attacks with a brief explanation, but it was helpful and interesting. great job!

    ReplyDelete