Friday, June 21, 2019

Attacking Cryptography Computer Security Essay Example | Topics and Well Written Essays - 1500 words

Attacking Cryptography Computer Security - Essay ExampleOperating Systems store discipline about commonly utilize programs and through the network, programs such as KeePass can read encrypted files, posing a serious fight to cryptography as a information protection technique. til now so, the challenge for KeePass is that it operates for a limited duration beyond which it does not have the capability to read encrypted files. A number of encrypted data files stored in the various accumulate locations are at risk of attacks by such malicious program as KeePass. These programs can study the number of times a cryptographic schema used the same cache locations (Dong & Chen, 2012). This study investigates and presents cryptographic attack trees which illustrate the methods Charlie can use to read Alices data files in the data raptus channel. KeePass can use the memory address information in the network to access the locations of the files using a set of secret coded access keys in t he mathematical operation (Vacca, 2012). The attack trees demonstrate a clear and reliable procedure for studying the access keys considering the information on the patterns of memory access. The trees have to show the possibility of KeePass increase its speed of data search in order to access the secret keys within a fraction of a second to enable the actual attack on cryptographic process to be successful. 2. Possibilities of Attack Out of the study, the expectation is to discover ways of improving cryptography as a means of data protection. Various computer security firms provide information about data protection methods, encryption and decryption being one of them (Echizen, Kunihiro & Sasaki, 2010). The experts in the field of information security use special software applications to block hackers from accessing information from their servers and in the entire unsecure channels in the networks. These hacker-proof programs are the targets of cryptography attack, using the same s trategies as KeePass. Anformer(a) common open source hacker-proof application in the global network is triple-DES security. In essence, it is intriguing to realize that secure channels are similarly at risk of being broken into at any time. Cryptography has for a long time been among the safest methods for headring information in the global data transfer networks. With the possibility of breaking through the unbreakable security calls for newer ways of improving the cryptographic designs apart from discovering other alternative options of data protection (Handschuh & Hasan, 2005). The capability of KeePass and other key cracking software programs is a real proof that even strong cryptography keys get broken into. This implies that there are attacks that are beyond the capability men. Information security experts must first exhaustively identify the sources of cryptographic attacks (Anupam, 2009). This can be done through designing ways of exemplar threats of attacks against comp uter systems. This requires a god understanding of all possible ways through which system attacks can be possible. This study focuses on ways of designing counterattacks methods such as access key protection in order to frustrate the possible attacks. 2.1. Key Protection The possibility of information attacks emerges as a result of ignorance of information

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.