International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 1 - Number 25 |
Year of Publication: 2010 |
Authors: Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua |
10.5120/467-772 |
Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua . Article:Meet in the Middle Attack: A Cryptanalysis Approach. International Journal of Computer Applications. 1, 25 ( February 2010), 1-4. DOI=10.5120/467-772
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet in the Middle Attack on triple S-DES algorithm, instead of using Brute force attack.