Wednesday, February 15, 2017

Cryptography: Cryptanalytic Attacks

Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera
Ciphertext only attack

In this method, the attacker has access to a set of ciphertext(s). One ciphertext or many?
He does not have access to corresponding plaintext.
COA is said to be successful when the corresponding plaintext can be determined from a given set of ciphertext.
Occasionally, the encryption key can be determined from this attack.
Modern cryptosystems are guarded against ciphertext-only attacks.
 
Step forward in 2017: Build in-demand career skills with CourseraStart your future with a Data Analysis Certificate.Start your future with a Data Science Certificate.

Known plaintext attack
In this method, the attacker knows the plaintext for some parts of the ciphertext.
The task is to decrypt the rest of the ciphertext using this information.
This may be done by determining the key or via some other method.
Let’s say for example that Alice sends Bob a message everyday starting with “hello” messages…. If Darth analyzes those ciphertext to get the message.
 

Chosen plaintext attack

In this method, the attacker has the text of his choice encrypted.
So he has the ciphertext-plaintext pair of his choice.
This simplifies his task of determining the encryption key.
A popular public key cryptosystem, RSA is also vulnerable to chosen-plaintext attacks.
Chosen-plaintext attacks were used by Allied cryptanalysts in World War II for breaking of Enigma ciphers.
 

Chosen ciphertext attack

A cryptanalyst can analyze chosen ciphertexts together with corresponding plaintexts. His goal is to acquire a secret key or to get as many information about the attacked system, as possible.
The attacker has capability to make the victim (who knows the secret key) decrypt a selected ciphertext and send him the result. Analyzing the chosen ciphertext and corresponding received plaintext, the intruder tries to guess the secret key which was used by the victim.
Chosen-ciphertext attacks are usually used for breaking systems with public key encryption. For example, early versions of RSA cipher were vulnerable to such attacks. They are used less often for attacking systems protected by symmetric ciphers. Some self-synchronizing stream ciphers were attacked in that way.
  Online learning to jumpstart your future.Start your future on Coursera today.Online computer science courses to jumpstart your future.

Types of Attacks
Known to Cryptanalyst
Ciphertext Only
·Encryption algorithm
·Ciphertext
Known Plaintext
·Encryption algorithm
·Ciphertext
·One or more plaintext–ciphertext pairs formed with the secret key
Chosen Plaintext
·Encryption algorithm
·Ciphertext
·Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key
 

Types of Attacks
Known to Cryptanalyst
Chosen Ciphertext
·Encryption algorithm
·Ciphertext
·Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key
Chosen Text
·Encryption algorithm
·Ciphertext
·Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key
·Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key
Chosen text attack
–This is a combination of Chosen plaintext attack and chosen ciphertext attack
Coursera Business Vertical Orange Design 10 Coursera AH Purple Design 2 Coursera Data Science



Business Analytics from the Wharton School Big Data Specialization from UC San Diego Data Science Specialization from Johns Hopkins University

No comments:

Post a Comment