Time
57 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Hello there. Welcome to protecting data. My name is Alberto Garcia, and I will be guiding you through this process. In this period, we're going to analyze what Chris analysis is.
00:15
Crypt analysis is the story off cipher text ciphers on crypto systems with the aid off. Understanding how they work on finding UN improving techniques for defeating or weaken in them.
00:31
For example, crypt analyst, sick to the crate cipher text without polish off the plain text, first encryption key or the algorithm used to encrypt it.
00:43
Crypt Analysts also targets secure hashing digital signatures on other cryptographic algorithms.
00:51
Why The objective off crypt analysis is to find witnesses in or otherwise defeat cryptographic algorithms. Create analyst research Results are used by photographers to improve on its Trenton or replace for Calgary. Lt's
01:07
both create analysis, which focuses on the ciphering and critter data on photography, which focuses on creating an improving encryption ciphers on other algorithms on aspects off cryptology which, as we know,
01:23
is the mathematical story off cold ciphers under laters algorithms,
01:30
then are many different types off pretty analysis attacks until leeks, with very depending on how much information the analysts house about the cipher text being analyzed. Some crude analytic methods include
01:46
cipher text on Lee attack. He hear the attacker on Lee has access to one or more encrypted messages but knows nothing about the plain text data.
01:57
The encryption algorithm be used or any data about the cryptographic key being used.
02:04
This is the type of challenge that intelligence agencies off their face when they have intercepted and create that communications from an opponent
02:14
in alone. Plain text Attack. The analyst may have access to foam or all off the plane takes off the cipher text. The analyst goal in this case is to discover the key used to increase the message under Create the message. Once the key is discovered
02:31
on, Attacker can decreed all messages that have been created youth in that key.
02:37
For example, if the Tucker is aware that a particular Mrs is addressed to or about a particular person, that person's name, maybe a suitable known plain text
02:49
in a Children playing text attack journalists either knows the encryption algorithm or has access to the device used to increasing day. Analysts can't and create the show's in plain text with the targeted algorithm to the right information about the key
03:07
differential. Crit analysis. Attack is a type of show. Simply text attack on block ciphers that analyzes first off plan ticks rather than single blank checks so the analysts can determine how the targeted algorithm works Will in Connor's different types off data
03:28
in liberal critical analysis attacks are similar to differential crit analysis attacks, but instead off bears off train TEX It uses sets off plan takes in which part off the plain text is kept constant. But the rest of the plain text is more fight.
03:46
This attack can be especially useful
03:50
when applied to block ciphers that are based on subsidies. Sean Permutation Networks
03:57
aside, Channel attack depends on information collected from the physical system being used to increase or decrease it.
04:05
Successful side channel attacks use data that is neither the cipher text resulting from the encryption process nor the plain text Vivian created but rather might be related to the amount of time it takes for a system to respond to specific queries
04:25
or the amount of power consumed by the encryption system.
04:29
All electromagnetic radiation. Immediate biting crypt in system.
04:35
A dictionary attack is a technique typically used against Passmore files on exploits the human tendency to use passwords based on natural wars
04:47
or, if you guessed, sequences off letters or numbers.
04:53
The dictionary attack works by encrypting all the wars in a dictionary on, then checking whether they're resulting harsh much is an encrypted pass for store in the sound file. Former or other bus were filed.
05:10
Man in the Middle Attacks a cool will paternalist find ways to in certain cells into a communication channel between two parties who wish to exchange their keys for secure communication, be a asymmetric or public infrastructure.
05:29
The attacker then performs a kiss tunes, which each party with the regional parties believing they are exchanging keys with each other. The two parties then end up using keys that are known to the attacker.
05:45
All the type of attacks can include techniques for convincing individuals to reveal their past four or encryption keys,
05:54
developing toy horse programs that steal secret keys from victim's computers and send them back to the crypt analyst
06:01
or tricking a big team into using A. We can't script a sister
06:09
because crypt analysis is mainly a mathematical subject that do for doing criticality. Sze are in many cases this Christ. In academic research papers, however, there are many tools on other sources available. Some off, then include Creep Tool,
06:28
which is an open source, projects that producers learning programs on a Web portal
06:34
for learning about crit analyses on cryptographic algorithms.
06:40
Crittle is other main specific language or originally designed to be used by the National Security Agency, specifying cryptographic algorithms. Crystal makes it possible for you, Thurs. To monitor how algorithms operate.
06:57
And so for programs written to specify the algorithms or ciphers,
07:02
crypto Revenge is a program that can be used to do crypt analysis all cipher text generated with many common algorithms. It can increase or the crypt with 29 d friend symmetric encryption algorithm.
07:19
Gansa organised Sure, meaning big clock or skeleton key. Spanish is an open source script analysis tool used for classical. Fully automatic on moral, frenetic ciphers.
07:32
Ever crack is an open source. GPS software wish deals mainly with mono alphabetic substitution on transposition cipher.
07:44
Jennifer is the crypt analysis tool that can be used to attack all ciphers. Additionally, it can be used to analyze cookies on Lastly, Alfa Peeler, which is a free we're non commercial. So for for educational on personal youth
08:01
includes and the five sharp one
08:05
on our s. A key generation on the stories, classic ciphers.
08:11
Okay, here's a question for you. Wish technique is typically used against us for files on exploits, the human tendency to use passports based on natural wars or easily guessed sequences off letters or numbers.
08:26
Do you think is a dictionary attack or be money in the meter attacks or C show simply takes attack or maybe d cipher text only attack.
08:39
If you said a, you're correct. The dictionary attack work's been creating all the wars in a dictionary on then, checking whether the resulting harsh marches on in Crete it pass were stored.

Up Next

Fundamental Cryptography: Data Protection

In Fundamental Cryptography: Data Protection, the instructor provides a clear and concise definition of data encryption and how to protect data both in transit and at rest. The instructor takes an in-depth look at how to utilize cryptography, cryptology, encryption, PKI, as well as permissions to ensure that data is properly secured.

Instructed By

Instructor Profile Image
Adalberto Jose Garcia
Information Security Analyst at Bigazi
Instructor