Explore chapters and articles related to this topic
Cryptographic Attacks, Impacts and Countermeasures
Published in Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan, Security Analytics for the Internet of Everything, 2020
Hazaa Al Fahdi, Mohiuddin Ahmed
COA is one of the cryptographic attacks which is used for cryptanalysis. The attack is based on accessing only a set of ciphertext. The attackers are aiming to obtain the encrypted messages, information, or the secret keys of them to gain more data or other information in cryptography algorithms. Moreover, it may be hard to attack modern ciphers through COA. Thus, there are two methods that can help to breach the modern ciphers. The first method is exploiting the two-time pad. Cryptography experts say that never use the same keystream more than one time because the cipher will be able to attack by COA. The second method is frequency analysis, which is a common type of COA attack which focuses on analyzing the frequency of letters in a ciphertext. Each language or ciphertext will have its own letters that will make the frequency analysis to get successful results [1].
A Metric to Assess Cyberattacks
Published in Wayne Patterson, Cynthia E. Winston-Proctor, Behavioral Cybersecurity, 2019
Wayne Patterson, Cynthia E. Winston-Proctor
For example, with this simple encryption method, the Attacker might logically conclude that the original (plaintext) message was in the English language, and therefore conduct what is known as a frequency analysis. Since we have assumed that each letter of the alphabet of the message is replaced by another, a frequency attack simply tallies the number of times each letter in the encrypted message is used. In any sample of English language text of a sufficient size, in almost every case, the letter “E” will occur almost 50% more often than any other letter of the alphabet. Hence, once the attacker has conducted the tally of all of the letters in the encrypted message (which would take only a few seconds even for very large body of text), he or she will have discovered the encrypt for the letter E. Also, in most cases, the second most frequent letter occurring will be the letter “T,” so the Attacker can make that replacement as well.
A Usability Study of the Central-Bantu Multilingual Keyboards
Published in International Journal of Human–Computer Interaction, 2021
Thokozani Chimkono, Eunice Mphako-Banda, Amelia Taylor, Pascal Kishindo
In this article, we assess the practical usability of the new keyboards by finding out, firstly, how they perform within the Central-Bantu group, on Chichewa and English, and secondly, how they balance out performance between the two languages. The study goal is to find out whether early-keyboard-users experience high usability with balanced levels between the local and international languages which are represented by Chichewa and English in this study. In the first part of the article, components of experimental design for multilingual usability are identified. The second part, the study methods, applies the design components while handling confounding variables introduced by the different languages involved. Letter-frequency analysis is used to predict potential performance imbalances within languages. Chichewa and English are selected as cross-group samples for experiments. After user-experiments comparative evaluation of simulation and experimental results is done using ANOVA.