Increase time required to break an encryption algorithm

Assignment Help Basic Computer Science
Reference no: EM132450008

While man-in-the-middle attacks are nothing new, several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP. The experts worked with a graduate student to demonstrate an attack which enables an attacker to decode an encrypted mail message if the victim falls for a simple social-engineering ploy.

The attack would begin with an encrypted message sent by person A intended for person B, but instead the message is intercepted by person C. Person C then launches a chosen cipher text attack by sending a known encrypted message to person B. If person B has his e-mail program set to automatically decrypt the message or decides to decrypt it anyway, he will see only a garbled message. If that person then adds a reply, and includes part of the garbled message, the attacker can then decipher the required key to decrypt the original message from person A.

The attack was tested against two of the more popular PGP implementations, PGP 2.6.2 and GnuPG, and was found to be 100% effective if file compression was not enabled. Both programs have the ability to compress data by default before encrypting it, which can thwart the attack. A paper was published by Bruce Schneier, chief technology officer of Counterpane Internet Security Inc.; Jonathan Katz, an assistant professor of computer science at the University of Maryland; and Kahil Jallad, a graduate student working with Katz at the University of Maryland. It was hoped that the disclosure would prompt changes in the open-source software and commercial versions to enhance its ability to thwart attacks, and to educate users to look for chosen cipher text attacks in general.

PGP is the world?s best known e-mail encryption software and has been a favorite since Phil Zimmermann first invented it in 1991; it has become the most widely used e-mail encryption software. While numerous attacks have been tried, none have yet succeeded in breaking the algorithm. With the power of computers growing exponentially, cracking this or even more modern algorithms is only a matter of time.

1. What can be done to increase the time required to break an encryption algorithm?

2. What is often the trade-off when using more complex algorithms?

3. Phil Zimmermann had to face considerable resistance from the government before being allowed to distribute PGP. What were their concerns, and why did they finally allow its eventual release?

4. Think of other social engineering schemes that might be employed in an effort to intercept encrypted message.

Reference no: EM132450008

Questions Cloud

Describe three nonrenewable energy sources : Describe three nonrenewable energy sources. What are the benefits and challenges of each of these energy sources?
What was Monty Corps times interest earned : In recent year Monty Corp. had net income of $152000, interest expense of $28700, What was Monty Corp.'s times interest earned (rounded) for the year
What are some challenges to implementing resource : Propose the use of one specific renewable resource to help reduce the reliance on fossil fuels. What are some challenges to implementing this resource?
Describe fraud mitigation : How will a well-thought database design make a system more efficient and less susceptible to fraud? Likewise, what role does company's risk assessment play
Increase time required to break an encryption algorithm : What can be done to increase the time required to break an encryption algorithm? What is often the trade-off when using more complex algorithms?
Basic types of current transformers : What are the basic types of current transformers that are used during power distribution and transmission?
How noncontrolling interest differ the cost method : How does the noncontrolling interest differ between the cost method and the equity method? ssuming the use of the cost method.
Some of the automotive technology faculty members : One of the chemistry professors working with some of the automotive technology faculty members, invents a new nonflammable compound
Illustrate the implication of new information : Illustrate the concept: Identify a fact she stated that most surprised you and illustrate the implication of this new information.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd