International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 111

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase | Sapna Khapre [4]


Abstract: Identifying a given binary program implements a specific cryptographic algorithm and finding out more information about thecryptographic code is an important problem. In this paper, we present several methods to identify cryptographic primitives within a given binary programin an automated way. CipherXRay is a novel binary analysis framework that can automatically identify and recover the cryptographic operations. CipherXRay able to pinpoint the boundaries between the multiple rounds of cryptographic operation. It can further identifies certain operation modes (e. g. , ECB, CBC, CFB) of the identified block cipher and tell whether the identified block cipher operation is encryption or decryption in certain cases. This results that current software implementations of cryptographic algorithms hardly achieve any secrecy if their execution can be monitored.


Keywords: Binary analysis, Cryptographic Operations, Key Recovery, Transient secrete, Cryptographic Algorithm


Edition: Volume 3 Issue 11, November 2014,


Pages: 3182 - 3187

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation


How to Cite this Article?

Punam Hiwase, Sapna Khapre, "Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14178, Volume 3 Issue 11, November 2014, 3182 - 3187, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Cryptographic Operations'

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan [2] | Poonam V. Gupta

Share this Article

Downloads: 143

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 80 - 82

Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny [2] | Anisha Antu

Share this Article


Top