Cryptanalysis Attacks Flashcards
amount of time and processing power required to break an encryption mechanism.
Work Force
Time = number of primitive operations that must be performed, Memory = amount of storage required to perform attack, Data = amount of data of both plaintext and ciphertext.
Cryptanalysis Resources for Cracking Systems
attacker obtains ciphertexts that correspond to set of plaintext of attackers choosing. Goal is to get the key and use key over and over again for other messages.
Chosen Plaintext Attacks
attacker has access to collection of ciphertext only. requires access to corresponding plaintext or key to be successful.
Ciphertext-Only Attack
attacker obtains ciphertext w/2 different keys.
Related-Key Attack
attacker can generate the decrypted text.
Chosen Ciphertext
encrypted text and plaintext are known, goal is to get the key.
Known plaintext
useful against block ciphers, extension of differential cryptanalysis, based on substitution-permutation networks.
Integral Cryptanalysis
applicable to symmetric keys, examines differences in input and how it affects the result difference of output, works with known plaintext and ciphertext only.
Differential Cryptanalysis
??? functionally equivalent algorithm for encryption/decryption but no key.
??? attacker learns additional info about cipher text not previously known.
??? attacker gains “Shannon info” (raw data) about plaintext or cipher text not previously known.
*** Total Break : I have the key
Global Deduction / Instance Deduction / Information Deduction Etc …