CrypTool

Last updated

CrypTool
Developer(s) Bernhard Esslinger
Initial release1998;26 years ago (1998)
Stable release
CT 1.4.42 (December 2021)

CT 2.1 (release 2022.1) (December 2022)
JCT 1.0.3 (February 2021)

Contents

Repository
Operating system CT1 and CT2: Microsoft Windows,
JCT: Win, Linux and macOS
Type Cryptography, Encryption, Privacy, E-Learning
License Apache Licence 2.0
Website www.cryptool.org

CrypTool is an open-source project [1] that is a free e-learning software for illustrating cryptographic and cryptanalytic concepts.

History

The development of CrypTool started in 1998. Originally developed by German companies and universities, it is an open-source project since 2001. [2]

Currently 4 versions of CrypTool are maintained and developed: The CrypTool 1 (CT1) software is available in 6 languages (English, German, Polish, Spanish, Serbian, and French). CrypTool 2 (CT2) is available in 3 languages (English, German, Russian). All others, JCrypTool (JCT) and CrypTool-Online (CTO), are available only in English and German. [3]

The goal of the CrypTool project is to make users aware of how cryptography can help against network security threats and to explain the underlying concepts of cryptology. [4]

CrypTool 1 (CT1) is written in C++ and designed for the Microsoft Windows operating system. A port of CT1 to Linux with Qt4 was started, but there is no progress anymore. [5]

In 2007, development began on two additional projects, both based on a pure-plugin architecture, to serve as successors to the original CrypTool program. Both successors regularly publish new stable versions:

uses the concept of visual programming to clarify cryptographic processes. Currently, CT2 contains more than 150 crypto functions.

Keysearcher.png

runs on Windows, macOS, and Linux, and offers both a document-centric and a function-centric perspective. Currently, JCT contains more than 100 crypto functions. One of its focal points are modern digital signatures (like Merkle trees and SPHINCS).

The CrypTool project is now being developed at the research institute CODE at the Bundeswehr University Munich. [10]

CrypTool is used in schools, universities, [11] companies and agencies for education and awareness training. [12] [13] [14] [15]

Merger with CrypTools

In early 2020, the CrypTool project decided to merge [16] with a similar project of the same name, CrypTools, founded in 2017 in Australia by Luka Lafaye de Micheaux, Arthur Guiot, and Lucas Gruwez. [17] CrypTool, much older and known, thus completely "absorbs" the project under its name.

Old logo, still used in CrypTool portal Ct-logo-big.png
Old logo, still used in CrypTool portal

The first impact of this merger is the rebranding of the project. A new logo, a new website, and the new CTO version are announced. Currently, it's still in development. Another change was the targeted audience. Previously, CrypTool focused on (university) students, and CrypTools on developers and young people. It was therefore necessary to broaden the audience.[ citation needed ]

See also

Related Research Articles

<span class="mw-page-title-main">Advanced Encryption Standard</span> Standard for the encryption of electronic data

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Data Encryption Standard</span> Early unclassified symmetric-key block cipher

The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.

<span class="mw-page-title-main">International Association for Cryptologic Research</span> Scientific organization for research in cryptology

The International Association for Cryptologic Research (IACR) is a non-profit scientific organization that furthers research in cryptology and related fields. The IACR was organized at the initiative of David Chaum at the CRYPTO '82 conference.

Articles related to cryptography include:

A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. It was designed in 1992-1993 as a replacement for the relatively stronger A5/1, to allow the GSM standard to be exported to countries "with restrictions on the import of products with cryptographic security features".

In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to break the Advanced Encryption Standard (AES) cipher, also known as Rijndael, faster than an exhaustive search. Since AES is already widely used in commerce and government for the transmission of secret information, finding a technique that can shorten the amount of time it takes to retrieve the secret message without having the key could have wide implications.

Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96. Kleptography is a subfield of cryptovirology and is a natural extension of the theory of subliminal channels that was pioneered by Gus Simmons while at Sandia National Laboratory. A kleptographic backdoor is synonymously referred to as an asymmetric backdoor. Kleptography encompasses secure and covert communications through cryptosystems and cryptographic protocols. This is reminiscent of, but not the same as steganography that studies covert communications through graphics, video, digital audio data, and so forth.

<span class="mw-page-title-main">Salsa20</span> Stream ciphers

Salsa20 and the closely related ChaCha are stream ciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted to the eSTREAM European Union cryptographic validation process by Bernstein. ChaCha is a modification of Salsa20 published in 2008. It uses a new round function that increases diffusion and increases performance on some architectures.

In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected probability, impossible differential cryptanalysis exploits differences that are impossible at some intermediate state of the cipher algorithm.

NTRUSign, also known as the NTRU Signature Algorithm, is an NTRU public-key cryptography digital signature algorithm based on the GGH signature scheme. The original version of NTRUSign was Polynomial Authentication and Signature Scheme (PASS), and was published at CrypTEC'99. The improved version of PASS was named as NTRUSign, and was presented at the rump session of Asiacrypt 2001 and published in peer-reviewed form at the RSA Conference 2003. The 2003 publication included parameter recommendations for 80-bit security. A subsequent 2005 publication revised the parameter recommendations for 80-bit security, presented parameters that gave claimed security levels of 112, 128, 160, 192 and 256 bits, and described an algorithm to derive parameter sets at any desired security level. NTRU Cryptosystems, Inc. have applied for a patent on the algorithm.

Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field . In certain cases those polynomials could be defined over both a ground and an extension field. If the polynomials have the degree two, we talk about multivariate quadratics. Solving systems of multivariate polynomial equations is proven to be NP-complete. That's why those schemes are often considered to be good candidates for post-quantum cryptography. Multivariate cryptography has been very productive in terms of design and cryptanalysis. Overall, the situation is now more stable and the strongest schemes have withstood the test of time. It is commonly admitted that Multivariate cryptography turned out to be more successful as an approach to build signature schemes primarily because multivariate schemes provide the shortest signature among post-quantum algorithms.

Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or in the security proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as the RSA, Diffie-Hellman or elliptic-curve cryptosystems — which could, theoretically, be defeated using Shor's algorithm on a quantum computer — some lattice-based constructions appear to be resistant to attack by both classical and quantum computers. Furthermore, many lattice-based constructions are considered to be secure under the assumption that certain well-studied computational lattice problems cannot be solved efficiently.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

The following outline is provided as an overview of and topical guide to cryptography:

This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.

This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.

PRESENT is a lightweight block cipher, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark in 2007. PRESENT was designed by Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. The algorithm is notable for its compact size.

<span class="mw-page-title-main">Speck (cipher)</span> Family of block ciphers

Speck is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013. Speck has been optimized for performance in software implementations, while its sister algorithm, Simon, has been optimized for hardware implementations. Speck is an add–rotate–xor (ARX) cipher.

<span class="mw-page-title-main">Orr Dunkelman</span> Israeli cryptographer and cryptanalyst

Orr Dunkelman is an Israeli cryptographer and cryptanalyst, currently a professor at the University of Haifa Computer Science department. Dunkelman is a co-director of the Center for Cyber Law & Privacy at the University of Haifa and a co-founder of Privacy Israel, an Israeli NGO for promoting privacy in Israel.

References

  1. Esslinger, Bernhard (22 September 2016). "CrypTool: An Open-Source E-Learning Project for Cryptography and Cryptanalysis" (PDF). Gesellschaft fuer Informatik, Crypto Day at SAP. This presentation delivers an overview. University of Siegen. Archived from the original (PDF) on 8 January 2017. Retrieved 26 September 2018.
  2. Esslinger, Bernhard (23 April 2013). "CrypTool: Modern open-source e-learning programs for cryptography and cryptanalysis" (PDF). Forum for Research and Innovation in Security and Communications. Retrieved 26 September 2018.
  3. "CrypTool 1: Downloads". CrypTool 1. Retrieved 26 September 2018.
  4. "CrypTool for Awareness". CrypTool Portal. Retrieved 26 September 2018.
  5. CrypTooLinux project Archived 17 October 2016 at the Wayback Machine Porting CT1 to Linux.
  6. CrypTool 2: Developer site of the CT2 project Besides release and beta versions, each day a so called "Nightly Build" is produced for download.
  7. CrypTool 2: Facebook Site of the CT2 project
  8. JCrypTool 1.0: GitHub project of JCT Beta versions are updated each weekend as so called "Weekly Builds" for download.
  9. JCrypTool 1.0: Site of the JCT project
  10. "Kryptografie-Lernsoftware CrypTool wird jetzt an der Bundeswehr-Uni in München weiterentwickelt". Secupedia. Retrieved 29 August 2024.
  11. Adamovic, Sasa; Sarac, Marko; Veinovic, Mladen; Milosavljevic, Milan; Jevremovic, Aleksandar (2014). "An Interactive and Collaborative Approach to Teaching Cryptology". Educational Technology & Society. 17 (1): 197–205. JSTOR   jeductechsoci.17.1.197.
  12. "Winter School in Information Security. Overview presentation, Finse 1222, April 21-26, 2013". Forum for Research and Innovation in Security and Communications. 6 February 2013. Retrieved 26 September 2018.
  13. Eckert, Claudia; Clausius, Thorsten; Esslinger, Bernd; Schneider, Jorg; Koy, Henrik. "CrypTool, 2003-08-07" (PDF). Technische Universitaet Darmstadt. Technische Universitaet Darmstadt. Retrieved 26 September 2018.[ permanent dead link ]
  14. Kopal, Nils. "Solving Classical Ciphers with CrypTool 2" (PDF). Linköping University Electronic Press. Linköping University Electronic Press. Retrieved 26 September 2018.
  15. Ronald, Kenneth. "Crypto Casino" . Retrieved 14 January 2024.
  16. "Arthur Guiot - Merging CrypTool & CrypTools". arguiot.com. Archived from the original on 6 June 2020. Retrieved 17 May 2020.
  17. CrypTools project (2017), An introduction to CrypTools.