NUST Institutional Repository

Validation of Encryption Implementation in Software through Reverse Engineering

Show simple item record

dc.contributor.author Waqas, Muhammad
dc.contributor.author Supervised by Dr Mehreen Afzal.
dc.date.accessioned 2020-10-27T08:00:19Z
dc.date.available 2020-10-27T08:00:19Z
dc.date.issued 2018-11
dc.identifier.other TIS-261
dc.identifier.other MSIS-15
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5850
dc.description.abstract These days data security and communication are major concern for every organization/ individual and there are bundle of software available which uses cryptographic primitives to protect internal data and to secure communication. Users want to know that either the software they are using for their organization or data is really the one that the developer has promised or mentioned in the specification because not every software is open source. In case of close source software there need to be some parameters that can guarantee that the software is implemented well as stated in the specification secondly the best implementation practice is in place. AES (Advance Encryption Standard) is FIPS approved cryptographic algorithm that is basically used for data protection. It is widely used for encryption and decryption of data in software as well as hardware. Reverse engineering is a technique used to disassemble or discover the concept or code used in applications. In this research, Different reverse engineering techniques were explored to discover standard or otherwise implementation of AES encryption mechanism. This include correct algorithm as defined in this work, key mechanism and modes of encryption. This research also introduces a framework which can be used to achieve the goals using design heuristics and AES signatures which were formulated over the period of time. To automate and speed up the detection process a tool named “AES Crypto Scanner”was developed, which will scan the assembly file against defined parameters. en_US
dc.language.iso en en_US
dc.title Validation of Encryption Implementation in Software through Reverse Engineering en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account