ISS Lab Attacks
ISS Lab Attacks
General Instructions:
You must select One attack on private key cryptography algorithm, one attack on public key
cryptography algorithm and one primality testing technique from the list below.
You must demonstrate how each one works via code/tool/simulator, record the video while
narrating the work, and prepare a 5-page plag and AI-free report on it. The video and report
may be submitted to teams as an assignment. You may upload the OneDrive/Google
Drive/cloud link.
Two members are allowed to do this component in CWS. The video and report should have a
proper contribution from both members.
• You must be extremely careful about the repot as it will be passed through Turnitin
software, any plag or AI detected will fetch ZERO marks with no excuses entertained.
• The cloud link should be working, if not then marks will also be cut for the same.
• The video should also be working with proper audio, any issues in this will lead to
marks cutting.
• You must work in a team of maximum two for this activity.
Classical Ciphers:
1. Caesar Cipher
- Brute Force Attack: Exhaustively trying all possible shifts.
- Frequency Analysis: Exploiting the frequency of letters in the ciphertext.
2. Affine Cipher
- Known Plaintext Attack: Utilizing knowledge of plaintext-ciphertext pairs.
- Brute Force Attack: Exhaustively trying all possible keys.
3. Vigenère Cipher
- Kasiski Examination: Identifying repeating patterns to determine key length.
- Frequency Analysis on Key Lengths: Analyzing the frequency of letters at each position in the key.
4. Playfair Cipher
- Playfair Cryptanalysis: Breaking down the Playfair cipher by analyzing digraph frequencies and patterns.
5. Hill Cipher
- Known Plaintext Attack: Exploiting known pairs of plaintexts and ciphertext.
- Matrix Inversion Attack: Attempting to invert the encryption matrix.
Modern Ciphers:
7. Data Encryption Standard (DES)
- Brute Force Attack: Exhaustively trying all possible keys.
- Differential Cryptanalysis: Exploiting differences between plaintext pairs.
3. ElGamal Encryption
- Chosen Ciphertext Attack: Gaining information about the plaintext by choosing ciphertexts for
decryption.
- Lattice-Based Attacks: Leveraging lattice-based techniques to break ElGamal.