Create
Learn
Share

Cryptographic Attacks

rename
tufotowo's version from 2015-08-25 20:12

Section

Question Answer
Brute ForceGenerates the entire keyspace, which is every possible key.
Chosen PlaintextChooses the plaintext to be encrypted in an attack.
Adaptive-Chosen PlaintextBegins with a chosen plaintext attack then adapts further rounds of encryption based on the previous round.
Chosen CiphertextChooses the ciphertext to be encrypted in an attack.
Adaptive-Chosen CiphertextBegins with a chosen ciphertext attack then adapts further rounds of encryption based on the previous round.
Meet In The MiddleEncrypts on one side, decrypts on the other side.
Known KeyKnow something about the key.
Side-ChannelUses physical data to break an cryptosystem, such as monitoring CPU cycles or power consumption.
Known PlaintextRelies on recovering and analyzing a matching plaintext and ciphertext pair. The goal is to derive the key that was used.
Differential CryptanalysisSeek to find the difference between related plaintexts that are encrypted.
Linear CryptanalysisFind large amounts of plaintext/ciphertext pairs created with the same key.
memorize