Answered You can hire a professional tutor to get the answer.

QUESTION

Create a 6 page essay paper that discusses Attacking Cryptography Computer Security.Download file to see previous pages... Operating Systems store information about commonly used programs and through

Create a 6 page essay paper that discusses Attacking Cryptography Computer Security.

Download file to see previous pages...

Operating Systems store information about commonly used programs and through the network, programs such as KeePass can read encrypted files, posing a serious attack to cryptography as a data protection technique. Even so, the challenge for KeePass is that it operates for a limited duration beyond which it does not have the capability to read encrypted files. A number of encrypted data files stored in the various cache locations are at risk of attacks by such malicious program as KeePass. These programs can study the number of times a cryptographic system used the same cache locations (Dong &amp. Chen, 2012). This study investigates and presents cryptographic attack trees which illustrate the methods Charlie can use to read Alice’s data files in the data transfer channel. KeePass can use the memory address information in the network to access the locations of the files using a set of secret coded access keys in the operation (Vacca, 2012). The attack trees demonstrate a clear and reliable procedure for studying the access keys considering the information on the patterns of memory access. The trees have to show the possibility of KeePass increasing its speed of data search in order to access the secret keys within a fraction of a second to enable the actual attack on cryptographic process to be successful. 2. Possibilities of Attack Out of the study, the expectation is to discover ways of improving cryptography as a means of data protection. Various computer security firms provide information about data protection methods, encryption and decryption being one of them (Echizen, Kunihiro &amp. Sasaki, 2010). The experts in the field of information security use special software applications to block hackers from accessing information from their servers and in the entire unsecure channels in the networks. These hacker-proof programs are the targets of cryptography attack, using the same strategies as KeePass. Another common open source hacker-proof application in the global network is triple-DES security. In essence, it is intriguing to realize that secure channels are also at risk of being broken into at any time. Cryptography has for a long time been among the safest methods for transferring information in the global data transfer networks. With the possibility of breaking through the unbreakable security calls for newer ways of improving the cryptographic designs apart from discovering other alternative options of data protection (Handschuh &amp. Hasan, 2005). The capability of KeePass and other key cracking software programs is a real proof that even strong cryptography keys get broken into. This implies that there are attacks that are beyond the capability men. Information security experts must first exhaustively identify the sources of cryptographic attacks (Anupam, 2009). This can be done through designing ways of modeling threats of attacks against computer systems. This requires a god understanding of all possible ways through which system attacks can be possible. This study focuses on ways of designing counterattacks methods such as access key protection in order to frustrate the possible attacks. 2.1.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question