International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 111

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase, Sapna Khapre

Identifying a given binary program implements a specific cryptographic algorithm and finding out more information about thecryptographic code is an important problem. In this paper, we present several methods to identify cryptographic primitives within a given binary programin an automated way. CipherXRay is a novel binary analysis framework that can automatically identify and recover the cryptographic operations. CipherXRay able to pinpoint the boundaries between the multiple rounds of cryptographic operation. It can further identifies certain operation modes (e. g. , ECB, CBC, CFB) of the identified block cipher and tell whether the identified block cipher operation is encryption or decryption in certain cases. This results that current software implementations of cryptographic algorithms hardly achieve any secrecy if their execution can be monitored.

Keywords: Binary analysis, Cryptographic Operations, Key Recovery, Transient secrete, Cryptographic Algorithm

Edition: Volume 3 Issue 11, November 2014

Pages: 3182 - 3187

Share this Article

How to Cite this Article?

Punam Hiwase, Sapna Khapre, "Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14178, Volume 3 Issue 11, November 2014, 3182 - 3187

Enter Your Email Address


Similar Articles with Keyword 'Cryptographic Operations'

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Share this Article

Downloads: 143

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 80 - 82

Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny, Anisha Antu

Share this Article

Similar Articles with Keyword 'Cryptographic Algorithm'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2536 - 2539

Crypto View: Visual Representation of Cryptographic Algorithms

Surumi Basheer, Sreena Sreedhar

Share this Article

Similar Articles with Keyword 'Binary'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'analysis'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Similar Articles with Keyword 'Cryptographic'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'Operations'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Recovery'

Downloads: 4 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'Transient'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1102 - 1105

Subgroup Discovery a Data Mining Technique: Immense Survey

Deepali Nidhan Gunjate, B. R. Kanawade

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 659 - 662

A Time Efficient Approach for Error Location Detection and Correction in Big Data Cloud Storage

Kamal Sharma, Karambir Bidhan

Share this Article

Similar Articles with Keyword 'secrete'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Similar Articles with Keyword 'Algorithm'

Downloads: 134 | Weekly Hits: ⮙2 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 510 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article
Top