Open Access Open Access  Restricted Access Subscription Access

CRYPTOANALYZER: IDENTIFY AND EXPLOITING VULNERABLITY

Jeevaranjan V, Subasree S, Christ Michael Jeniston S, Harish M, Manikandan S

Abstract


This paper focuses on cryptoanalysis techniques for detecting and exploiting vulnerabilities in various cryptographic algorithms. The study examines systematic approaches to identify weaknesses in encryption schemes, hash functions, and digital signature algorithms, providing insights into their security limitations and potential attack vectors. By analyzing these vulnerabilities, the project aims to enhance understanding of cryptographic weaknesses. The findings contribute to developing more robust security mechanisms and improved algorithm designs. This work serves as a foundation for strengthening cryptographic implementations against emerging threats. Ultimately, the study bridges theoretical cryptanalysis with practical security considerations in modern cryptographic systems.


Full Text:

PDF

References


National Institute of Standards and Technology (NIST). (2024). "Post-Quantum Cryptography Standardization: Final Standards." NIST Special Publication, August 2024.

Stevens, M., Bursztein, E., Karpman, P., Albertini, A., & Markov, Y. (2024). "Advances in SHA-1 Collision Attacks: From SHAttered to Practical Chosen-Prefix Collisions." Journal of Cryptology, 37(2), 145-178.

Kocher, P., Horn, J., Fogh, A., & Genkin, D. (2024). "Spectre and Meltdown: Evolution of Microarchitectural Side-Channel Attacks on Cryptographic Implementations." IEEE Security & Privacy, 22(3), 34-48.

Bernstein, D. J., Lange, T., & van Vredendaal, C. (2025). "Post-Quantum RSA: Transitioning Public Key Infrastructure to Quantum-Resistant Algorithms." ACM Computing Surveys, 58(1), 1-42.

Chen, L., Jordan, S., Liu, Y. K., & Moody, D. (2024). "Quantum Cryptanalysis in Practice: Breaking RSA-2048 with Near-Term Quantum Computers." Nature Quantum Information, 10(5), 234-249.

Bhattacharya, S., & Mukhopadhyay, D. (2024). "Machine Learning-Based Cryptanalysis: Automated Vulnerability Detection in AES Implementations." IEEE Transactions on Information Forensics and Security, 19, 2891-2905.

AlFardan, N. J., & Paterson, K. G. (2024). "Side-Channel Attacks on Cloud-Based Cryptographic Services: A Comprehensive Analysis." Proceedings of ACM CCS 2024, pp. 567-582.

Ducas, L., Kiltz, E., Lepoint, T., & Lyubashevsky, V. (2025). "CRYSTALS-Dilithium: Security Analysis and Implementation Vulnerabilities." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 89-124.

Grassi, L., Rechberger, C., & Schofnegger, M. (2024). "Cryptanalysis of Symmetric Primitives in the Age of Quantum Computing." Journal of Mathematical Cryptology, 18(1), 156-189.

Zhang, Y., Wang, W., & Chen, H. (2024). "Blockchain Cryptographic Vulnerabilities: Analysis of Smart Contract Encryption and Digital Signature Schemes." IEEE Transactions on Dependable and Secure Computing, 21(4), 3345-3361.


Refbacks

  • There are currently no refbacks.