Using DSDM for Developing Graduate Study Based Cryptanalysis Projects

Wael Ali Hussein Saleh Aljumaily*, Sufyan T. Faraj Al-Janabi**
*-** College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq.
Periodicity:August - October'2019
DOI : https://doi.org/10.26634/jcs.8.4.17105

Abstract

This work focuses on the use of an agile software development methodology namely Dynamic System Development Method (DSDM) for the design and implementation of a general cryptanalysis platform for pedagogical purposes. The project is achieved by several graduate (mainly M.Sc.) student’s successive projects. Indeed, a small pilot project related to the cryptanalysis of classical ciphers is being explored. In this current version of the classical cipher cryptanalysis, only two techniques have been considered, which are brute force attack and letter frequency attack. Besides the educational benefits of expecting the information security side, as well as the other benefits of practicing with certain software development will also be investigated. Thus, the work can be considered to be under the general title of ethical hacking.

Keywords

Cryptanalysis; DSDM; Ethical Hacking; Open-ended Project; Software Engineering.

How to Cite this Article?

Aljumaily, W. A. H. S. and Al-Janabi, S. T. F. (2019). Using DSDM for Developing Graduate Study Based Cryptanalysis Projects. i-manager's Journal on Communication Engineering and Systems, 8(4), 1-8. https://doi.org/10.26634/jcs.8.4.17105

References

[1]. Abrahamson, P., Salo, O., Ronkainen, J., & Warsta, J. (2002). Agile Software Development Methods: Review and Analysis. Finland: VTT Publications.
[2]. Al-Janabi, S. T. F. (2011, April). Nahrainfish: A green cryptographic block cipher. In 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) (pp. 1-5). IEEE. https://doi.org/10.1109/SIECPC. 2011.5876890
[3]. Al-Janabi, S., & Hussein, W. A. (2016). Architectural design of general cryptanalysis platform for pedagogical purposes. i-manager's Journal on Software Engineering, 11(1), 1-12. https://doi.org/10.26634/jse.11.1.8189
[4]. Al-Janabi, S., Al-Khateeb, B., & Abd, A. J. (2017). Intelligent techniques in cryptanalysis: Review and Future Directions. UHD Journal of Science and Technology, University of Human Development (UHD), Sulaimaniya, KRG-Iraq, 1(1), 1-9.
[5]. Clark, A. (1994, December). Modern optimisation algorithms for cryptanalysis. In Proceedings of ANZIIS'94- Australian New Zealnd Intelligent Information Systems Conference (pp. 258-262). IEEE. https://doi.org/10.1109/ ANZIIS.1994.396969
[6]. Dimovski, A., & Gligoroski, D. (2003). Attacks on the transposition ciphers using optimization heuristics. In Proceedings International Scientific Conference on Information, Communication, & Energy Systems & Technologies (ICEST), (pp. 1-4).
[7]. DSDM Consortium (2008). DSDM Public Version 4.2 Manual. USA: DSDM Consortium.
[8]. Misra, S. C., Kumar, V., & Kumar, U. (2006). Success factors of agile software development. Software Engineering Research and Practice, 1, 233-239.
[9]. Peleg, S., & Rosenfeld, A. (1979). Breaking substitution ciphers using a relaxation algorithm. Communications of the ACM, 22(11), 598-605. https://doi.org/10.1145/ 359168.359174
[10]. Russo, B., Scotto, M., Sillitti, A., & Succi, G. (2010). Agile Technologies in Open Source Development. USA: Hershey- Information Science Reference. https://doi.org/10.4018/ 978-1-59904-681-5.ch002
[11]. Sani, A., Firdaus, A., Jeong, S. R., & Ghani, I. (2013). A review on software development security engineering using dynamic system method (DSDM). International Journal of Computer Applications, 69(25), 87-94.
[12]. Spillman, R., Janssen, M., Nelson, B., & Kepner, M. (1993). Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1), 31-44. https://doi.org/10.1080/0161-119391867746
[13]. Stapleton, J. (1997). DSDM Dynamic Systems Development Method: The Method in Practice. UK: Cambridge University Press.
[14]. Uddin, M. F., & Youssef, A. M. (2006, July). Cryptanalysis of simple substitution ciphers using particle swarm optimization. In 2006 IEEE International Conference on Evolutionary Computation (pp. 677-680). IEEE. https://doi.org/10.1109/CEC.2006.1688376
[15]. Verma, A. K., Dave, M., & Joshi, R. C. (2007). Genetic algorithm and tabu search attack on the mono-alphabetic substitution cipher i adhoc networks. Journal of Computer Science, 3(3), 134-137. https://doi.org/ 10.1.1.122.6400
[16]. Weerd, I. & Brinkkemper, S. (2008). Meta-modelling for situational analysis and design methods. In M.R. Syed Ed. Handbook of research on modern systems analysis and design technologies and applications (pp. 38-58), IGI Global,
[17]. Wenbo, M. (2004). Modern Cryptography: Theory and Practice. USA: Prentice Hall PTR - Hewlett Packard.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.