# Cryptographic Attacks

rename
tufotowo's
version from
2015-08-25 20:12

## Section

Question | Answer |
---|---|

Brute Force | Generates the entire keyspace, which is every possible key. |

Chosen Plaintext | Chooses the plaintext to be encrypted in an attack. |

Adaptive-Chosen Plaintext | Begins with a chosen plaintext attack then adapts further rounds of encryption based on the previous round. |

Chosen Ciphertext | Chooses the ciphertext to be encrypted in an attack. |

Adaptive-Chosen Ciphertext | Begins with a chosen ciphertext attack then adapts further rounds of encryption based on the previous round. |

Meet In The Middle | Encrypts on one side, decrypts on the other side. |

Known Key | Know something about the key. |

Side-Channel | Uses physical data to break an cryptosystem, such as monitoring CPU cycles or power consumption. |

Known Plaintext | Relies on recovering and analyzing a matching plaintext and ciphertext pair. The goal is to derive the key that was used. |

Differential Cryptanalysis | Seek to find the difference between related plaintexts that are encrypted. |

Linear Cryptanalysis | Find large amounts of plaintext/ciphertext pairs created with the same key. |

## Pages linking here (main versions and versions by same user)

No other pages link to this page. See Linking Quickstart for more info.