This personal website was setup with two objectives in mind
– As I am working, and have been working since 1998, in the IT Security field I receive a lot of IT Security related Information through vendors/research/emails/contacts and thought some people might find some of it interesting.
– To provide a public repository for my cryptography project, BUGS.
This project started in 1995 as an attempt to create my own cryptography algorithm. In 1998 this website was created and along the years the algorithm evolved as well as its applications suit.
Because of a busy professional life in the IT Security world I haven’t been able to work on the BUGS algorithm for many years. However, I have recently completed a Master in Information Security at the London Royal Holloway University. I logically chose to work on a cryptography subject for my Master Thesis. This allowed me to spend some time back on the BUGS algorithm and, for the first time, learn some cryptanalysis technics!
The main subject of my thesis was to give an “Overview of Modern Symmetric-Key Cipher Cryptanalysis Techniques”, as such after a general introduction on cryptography and cryptanalysis I focused on two main cryptanalysis technics:
Linear and Differential Cryptanalysis
Finally, I started to conduct a cryptanalysis of my BUGS algorithm. Although I still haven’t conducted a full cryptanalysis on BUGS, my early tests seem to indicate the BUGS algorithm, may show some weaknesses if not used with its default settings. On the other hand it seems to be quite secure when default settings are used . However, I would need to pursue those tests further to prove this is correct.
In the process I have also highlighted what I believe could be a new type of cryptanalysis attack:
Unrestricted XOR-Sum Uniqueness Cryptanalysis attack
At this stage this is just a suggested new type of attack and more work is required to find out if this attack is indeed possible and if it offers any value!
So here you have it, this is what I will try to spend some time on in the coming months/years:
– To conduct a full cryptanalysis on BUGS and publish the results
– To investigate my new type of cryptanalysis attack
If you want to contact me, then please send an email to contact (at) encryptsolutions.com
For information on how the PROJECT STARTED please click here.
For information on LICENSE please click here.
For information on REFERENCES please click here.
For information on the AUTHOR please click here.