Page 263 - CISSO_Prep_ Guide
P. 263
• The attacker can trick or induce
opposition into encoding the plaintext
of the attacker’s choice. The attacker
can capture the ciphertext and use it
along with the plaintext to discover
the key.
• Adaptive chosen-plaintext attack:
• Similar to chosen-plaintext but the
attacker has repeated the ability to
encode plaintext of choice. This
requires access to the cryptosystem
with the key loaded.
• Chosen ciphertext attack:
• Use against public-key cryptosystems.
• You can choose a piece of ciphertext
and can obtain the corresponding
decrypted plaintext (free use of
cryptosystem to decrypt but cannot
get decryption key).
• Adaptive chosen ciphertext attack:
• An adaptive version of chosen-
ciphertext.
• Man-in-the-middle.
• Side-channel attacks:
• Looking for something
computationally intense.
• Brute force (takes time & money).
• Birthday attack (looking for collisions).
• Attacks on Symmetric Block Ciphers (e.g.,
DES):
• Differential Cryptanalysis.