Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7748
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMahajan, Anmol-
dc.contributor.authorSaha, Suman [Guided by]-
dc.date.accessioned2022-10-13T07:09:04Z-
dc.date.available2022-10-13T07:09:04Z-
dc.date.issued2019-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7748-
dc.description.abstractCryptography plays a very important role in a wide range of areas from preserving our privacy on the online world to providing military a secure methodology to undertake their operations. In the vast history of this field the art of encoding or encrypting the messages has held the utmost importance. We have come so far. Ahead of using the secret hieroglyphics to the digitally advanced automated computational phase. Today digital security is taken for granted. But there are also some more aspects that need to be considered. These algorithms always tend to have some inherent sense of imperfection in them which can be exploited in one way or other to break the system. This could risk the whole system that we have built and can have some serious consequences. The art and science of finding such faults is called crytanalysis.DES is also one such encryption algorithm that had its share of inbuilt faults and many cryptanalytic methods have been built to break it. Some of these include Time Memory Data Trade-Off Attack, Differential Analysis, Linear Analysis and Differential-Linear Attack. Today, breaking DES is a task of only about a few hours but the cost of the required hardware is very high. In this project we are going to cryptanalyse the DES algorithm using the famous Time Memory Trade-off Attack.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectCryptographyen_US
dc.subjectTime Memoryen_US
dc.subjectTradeoff Attacken_US
dc.subjectData encryption standarden_US
dc.titleTime Memory Tradeoff Attack on Data Encryption Standard, DESen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Time Memory Tradeoff Attack on Data Encryption Standard, DES.pdf2.15 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.