A Survey Report on Various Cryptanalysis Techniques

Provided by: International Journal of Soft Computing and Engineering (IJSCE)
Topic: Security
Format: PDF
In this paper, the authors focus on various types of attacks on symmetric cipher & asymmetric cipher. In this paper, they tried to describe the existing cryptanalytic attacks on various ciphers and countermeasures to these attacks have been suggested on the basis of information available to attacker, computational time requirements and memory requirements etc. In order to develop a new secure cipher, it is very necessary that these attacks should be taken into consideration during development and countermeasures of these attacks should be applied in the design, so that the new design is not vulnerable to these attacks.

Find By Topic