Quality Assurance & Cryptography & Human-Computer Interaction by Solis Tech

Quality Assurance & Cryptography & Human-Computer Interaction by Solis Tech

Author:Solis Tech
Language: eng
Format: mobi
Published: 2016-02-09T22:00:00+00:00


The Assumptions of a Cryptosystem Attacker

This section of the book will discuss two important things about system attacks: (1) cryptosystem environments and (2) the attacks used by unauthorized parties to infiltrate cryptosystems.

The Cryptosystem Environment

Before discussing the types of data attacks, it is important to understand the environment of cryptosystems. The intruder’s knowledge and assumptions about this factor greatly influence his choices of possible attacks.

In the field of cryptography, three assumptions are made about the attacker and the cryptosystem itself. These assumptions are:

Information about the Encryption Method – Cryptosystem developers base their projects on two kinds of algorithms:

Public Algorithms – These algorithms share information with the public.

Proprietary Algorithms – These algorithms keep the details of the cryptosystem within the organization. Only the users and designers can access information about the algorithm.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.