Page 263 - CISSO_Prep_ Guide
P. 263

•  The attacker can trick or induce
                              opposition into encoding the plaintext
                              of the attacker’s choice.  The attacker
                              can capture the ciphertext and use it
                              along with the plaintext to discover
                              the key.
                   •  Adaptive chosen-plaintext attack:
                          •  Similar to chosen-plaintext but the
                              attacker has repeated the ability to
                              encode plaintext of choice.  This
                              requires access to the cryptosystem
                              with the key loaded.
                   •  Chosen ciphertext attack:
                          •  Use against public-key cryptosystems.
                          •  You can choose a piece of ciphertext
                              and can obtain the corresponding
                              decrypted plaintext (free use of
                              cryptosystem to decrypt but cannot
                              get decryption key).
                   •  Adaptive chosen ciphertext attack:
                          •  An adaptive version of chosen-
                              ciphertext.
                   •  Man-in-the-middle.
                   •  Side-channel attacks:
                          •  Looking for something
                              computationally intense.
                   •  Brute force (takes time & money).
                   •  Birthday attack (looking for collisions).
                   •  Attacks on Symmetric Block Ciphers (e.g.,
                       DES):
                          •  Differential Cryptanalysis.
   258   259   260   261   262   263   264   265   266   267   268