Cryptography 2 Flashcards
any nontrivial method that detects a difference between the ideal encryption scheme and the actual one.
distinguishing attack
attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expect.
Birthday Attack
Instead of waiting for a key to repeat, you can build a table of keys that you have chosen yourself.
Meet-in-the-Middle Attack
The difference between the birthday attack and the meet-in-the-middle attack is that in a birthday attack, you wait for a single value to occur twice within the same set of elements. In a meet-in-the-middle attack, you have two sets, and wait for an overlap between the two sets. In both cases, you can expect to find the first result at around the same number of elements.
Birthday Attack vs Meet-in-the-Middle Attack
is one that tries all possible values for some target object, like the key.
exhaustive search attack
The current generation of block ciphers has a block size of 128 bits (16 bytes). These block ciphers encrypt a 128-bit plaintext and generate a 128-bit ciphertext as the result. The block cipher is reversible; there is a decryption function that takes the 128-bit ciphertext and decrypts it to the original 128-bit plaintext. The plaintext and ciphertext are always the same size, and we call this the block size of the block cipher.
Cryptography Info …
To encrypt with a block cipher, we need a secret key. Algorithms for decrypt/encrypt are publicly known.
Cryptography Info #2 …
assumes that the attacker has access to several encryption functions. These functions all have an unknown key, but their keys have a relationship that the attacker knows.
related-key attack
in which the attacker specifies some part of the key and then performs a related-key attack on the rest of the key.
chosen-key attack
attacker suddenly gets to choose the key of the block cipher, which allows related-key and chosen-key attacks.
Davies-Meyer Hash Function