Architectural Design of General Cryptanalysis Platform for Pedagogical Purposes

Sufyan T. Faraj Al-Janabi*, Wael Ali Hussein Saleh Aljumaily**
* College of CS and IT, University of Anbar, Ramadi, Iraq.
** College of CS and IT, University of Anbar, Ramadi, Iraq.
Periodicity:July - September'2016
DOI : https://doi.org/10.26634/jse.11.1.8189

Abstract

Cryptanalysis is one of the most challenging research areas in the field of information security. Often, this includes how to find the key which has been used for hiding the message and thus to arrive to the original information. In order to avoid others’ attacks, one should first have enough knowledge and experience of the existing cryptanalytic attacks on various cryptographic systems. These attacks and their avoidance requirements can be described based on information available to opponent, computational time requisites, memory requirements, etc. Security analysis of the existing ciphers is very helpful to better understand the requirements for designing secure and efficient ciphers. This paper main objective is to propose a design for a general cryptanalysis platform for pedagogical purposes. Besides educational benefits expected on information security side, other benefits of practicing with certain software development methods will also be investigated. The whole work can be considered to be under the general title of ethical hacking. In order to make a solid ground for the research, the paper starts by surveying different cryptanalysis techniques for various cipher systems. The paper also reports on the progress of our ongoing work.

Keywords

Agile Development, Ethical Hacking, Cryptanalysis, Cryptography, Open-ended Project, Software Engineering

How to Cite this Article?

Al-Janabi, S. T. F., and Hussien, W. A. (2016). Architectural Design of General Cryptanalysis Platform for Pedagogical Purposes. i-manager’s Journal on Software Engineering, 11(1), 1-12. https://doi.org/10.26634/jse.11.1.8189

References

[1]. Arroyo, D., Alvarez, G., and Fernandez, V., (2009). “Basic framework for the cryptanalysis of digital chaosth based cryptography”. IEEE 6th International Multi- Conference on Systems, Signals and Devices, Tunisia.
[2]. Arroyo, D., Li, C., Li, S., Alvarez, G., and Halang, W. (2009). “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm”. Chaos, Solitons & Fractals, Vol. 41, No. 5, pp. 2613-2616.
[3]. Awad, M. A., (2005). “A comparison between Agile and Traditional Software Development Methodologies”. Honors Program Report for the School of Computer Science and Software Engineering, University of Western Australia.
[4]. Bechtsoudis, A., and Sklavos, N., (2010). “Side channel attacks cryptanalysis against block ciphers based on FPGA devices”. IEEE Annual Symposium on VLSI.
[5]. Beck, K., (1999). Extreme Programming Explained, Embrace Change. Addison Wesley.
[6]. Biryukov, A., and Khovratovich, D., (2009). “Relatedkey cryptanalysis of the full AES-192 and AES-256”. M. Matsui (Ed.): ASIACRYPT 2009, LNCS 5912, Springer-Verlag, 1–18.
[7]. Boehm, B., (1998). “A spiral model of software development and enhancement”. IEEE Computer, pp. 61-72.
[8]. Czarnacka-Chrobot, B., (2010). “The economic importance of business software systems size management”. Fifth International Conference on Computing in the Global Information Technology, pp. 293- 299.
[9]. Devi, V., (2013). “Traditional and agile methods: An interpretation”. Retrieved from https://www.scrumalliance .org/community/articles/2013/january/traditional-andagilemethods- an-nterpretation(Last access on 29/5/2016).
[10]. Highsmith, J. (2000). Adaptive Software Development: A Collaborative Approach to Managing Complex Systems. Addison Wesley.
[11]. Juric, R. (2000). “Extreme programming and its development practices”. Proceedings of the 22nd International Conference, Information Technology Interfaces, IEEE Publication, pp. 97-104.
[12]. Kahate, A. (2009). Cryptography and Network Security. 2/E, McGraw-Hill.
[13]. Led, X., Massey, J. L., and Murphy, S., (1991). “Markov ciphers and differential cryptanalysis”. Advances in Cryptology - Eurocrypt'91, Lecture Notes in Computer Science 547, Springer-Verlag.
[14]. Li, C., Zhang, D., and Chen, G. (2008). “Cryptanalysis of an image encryption scheme based on the Hill cipher”. Journal of Zhejiang University Science A, Vol. 9, No. 8, pp. 1118–1123.
[15]. Luthra, J., and Pal, S. K., (2011). “Hybrid Firefly Algorithm using Genetic Operators for the Cryptanalysis of a Monoalphabetic Substitution Cipher”. In Proceeding of World Congress on information and Communication Technologies (WICT).
[16]. Manjunath, K., Jagadeesh, J., and Yogeesh, M., (2013). “Achieving quality product in a long term software product development in healthcare application using Lean and Agile principles”. International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), Kottayam, IEEE publication, pp. 26-34.
[17]. Mao, W., (2004). Modern Cryptography: Theory & Practice. Upper Saddle River, NJ: Prentice Hall PTR.
[18]. Mokhov, S., (2010). “Cryptolysis: A framework for verification of optimization heuristics for the automated cryptanalysis of classical ciphers and natural language word segmentation”. IEEE 8th ACIS International Conference on Software Engineering Research, Management and Applications.
[19]. Nawrocki, J., Jasinski, M., Walter, B., and Wojciechowski, A., (2002). “Exreme programming modified: Embrace requirements engineering practices”. IEEE Joint International Conference on Requirement Engineering, pp. 303-310.
[20]. Nyberg, K, and Knudsen, L., (1995). “Provable security against differential cryptanalysis”. Journal of Cryptology, Vol. 8, No. 1.
[21]. Palmer, S., and Felsing, J., (2002). A Practical Guide to Feature-driven Development. Upper Saddle River, NJ: Prentice Hall PTR.
[22]. Pasalic, E., (2009). “Probabilistic versus deterministic algebraic cryptanalysis-A performance comparison”. IEEE Transactions on Information Theory, Vol. 55, No. 11.
[23]. Rising, L., and Janoff, N. (2000). “The scrum software development process for small teams”. IEEE Software, pp. 2-8.
[24]. Royce, W., (1970). “Managing the development of large software systems”. Proceedings of IEEE WESCON, Vol. 26, pp. 1-9.
[25]. Soleimany, H., Sharifi, A., Bahrak, B., and Aref, M., (2009). “Cryptanalysis of 7-round AES-128”. The 7th Iranian Community Conference.
[26]. Stallings, W. (2014). Cryptography and Network Security: Principles and Practice. 6/E, Pearson Education, Inc.
[27]. Stapleton, J., (1997). Dynamic Systems Development Method-The Method in Practice. Addison Wesley.
[28]. Toemer, R. and Arumugam, S. (2007). “Breaking transposition cipher with genetic algorithm”. Electronics and Electrical Engineering, Vol. 7, No. 79, pp. 75-78.
[29]. Vimalathithan, R. and Valarmathi, M. L. (2009). “Cryptanalysis of S-DES using genetic algorithm”. International Journal of Recent Trends in Engineering, Vol. 2, No. 4, pp. 76-79.
[30]. Wenling, W., and Dengguo, F., (2009). The Design and Analysis of Block Ciphers. 2/E, Tsinghua University Press, Beijing.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.