Module 5- Cryptanalysis Flashcards
Trying every possible key to break a cipher. For many types of encryption this is completely impractical because of the amount of time it would take to try every possible key.
Brute Force
Using a method (other than brute force) to derive the key of a cipher. In some cases cryptographic techniques can be used to test the efficacy of a cryptographic algorithm. Frequently used to test hash algorithms for collisions.
Cryptanalysis
The most basic tool for breaking most classical ciphers. Not effective against modern ciphers.
Frequency Analysis
A method if attacking polyalphabetic substitution ciphers. Can be used to deduce the length of the keyword used in the polyalphabetic substitution cipher.
Kasiski
A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
Chosen Plaintext Attack
A method for cracking modern cryptography. Attacker only has access to a collection of cipher texts. Much more likely than known plain text, but also more difficult. The attack is completely successful if the corresponding plain texts can be deduced or, even better, the key. The ability to gain any information about the underlying plain text is considered a success.
Ciphertext-only and related-key Attack
Based on finding the approximations to the action of a cipher. Commonly used on block ciphers. A known plain text attack that uses linear approximation to describe the behavior of the block cipher. Given enough pairs of of plain text and corresponding cipher text, bits of information about the key can be obtained. The more pairs of plain text and cipher text the greater chance of success.
Linear Cryptanalysis
Form of cryptanalysis applicable to symmetric key algorithms. The examination of differences in an input and how that affects the resultant difference in output. Originally only worked w/ chosen plain text.
Differential Cryptanalysis
An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
Integral Cryptanalysis
Cryptanalysis Resources
Time - number of primitive operations which must be performed
Memory - Amount of storage required for the attack
Data - the quantity of plain texts and cipher texts required.
A cryptanalysis success where the attacker deduces the secret key.
Total Break
A cryptanalysis success where the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without key learning.
Global Deduction
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
Instance (Local) Deduction
A cryptanalysis success where the attacker gains some Shannon information about plain texts (or cipher texts) not previously known.
Information Deduction
A cryptanalysis success where the attacker can distinguish the cipher from a random permutation.
Distinguishing Algorithm