Downloads: 111 | Views: 122
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation
Punam Hiwase | Sapna Khapre [4]
Abstract: Identifying a given binary program implements a specific cryptographic algorithm and finding out more information about thecryptographic code is an important problem. In this paper, we present several methods to identify cryptographic primitives within a given binary programin an automated way. CipherXRay is a novel binary analysis framework that can automatically identify and recover the cryptographic operations. CipherXRay able to pinpoint the boundaries between the multiple rounds of cryptographic operation. It can further identifies certain operation modes (e. g. , ECB, CBC, CFB) of the identified block cipher and tell whether the identified block cipher operation is encryption or decryption in certain cases. This results that current software implementations of cryptographic algorithms hardly achieve any secrecy if their execution can be monitored.
Keywords: Binary analysis, Cryptographic Operations, Key Recovery, Transient secrete, Cryptographic Algorithm
Edition: Volume 3 Issue 11, November 2014,
Pages: 3182 - 3187
Similar Articles with Keyword 'Cryptographic Operations'
Downloads: 117
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2488 - 2491Securing Mobile User Data in Cloud Computing Environment
Manoj M. Chavan [2] | Poonam V. Gupta
Downloads: 143
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 80 - 82Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations
Stebin Sunny [2] | Anisha Antu