Известна атака с открит текст

Въведение

Incryptanalysis,aknownplaintextattackisanattackmode,whichmeansthattheattackerhasmasteredacertainsectionofplaintextxandthecorrespondingciphertexty.

Inallcryptanalysis,itisassumedthattheattackerknowsthecryptosystembeingused.ThisassumptioniscalledtheKockhoffhypothesis.Theknownplaintextattackalsoassumesthattheattackercanobtainpartoftheplaintextandthecorrespondingciphertext,suchasinterceptingthefirstpartoftheinformation,andobtainingtheencryptionmethodthroughthistypeofattack,soastofacilitatethecrackingofthelatterpartoftheciphertext.

Hillciphersrelyononlyciphertextattacks,whicharedifficulttocrack,butareeasiertobreakthroughknownplaintextattacks.

Свързани термини

Атака само с шифрован текст

Скиптонавигация и търсене

Incryptographyorcryptanalysis,Атака само с шифрован текстisanattackmodethatreferstoanattackwhenonlytheencryptedtext(ie,ciphertext)isknown.Thisschemecanbeusedtoattacksymmetriccryptosystemsandasymmetriccryptosystemsatthesametime.

Theciphertext-onlyattackhopestoachieveseveralgoals,arrangedaccordingtothedegreeofsuccess:

  • Вземете малко информация в оригиналния обикновен текст.

  • Вземете оригиналния обикновен текст.

  • Научете ключа за декриптиране.

Theexhaustivemethodisaciphertext-onlyattack,buttheexhaustivemethodisgenerallyconsideredwhendesigningthealgorithm.

Изберете атака на обикновен текст

Skiptonavigationandjumptosearch

Incryptographyorcryptanalysis,selectplaintextattackreferstoItisamodeofattack.Theattackerhasaccesstotheencryptionmachineandcanconstructciphertextcorrespondingtoanyplaintext.

Inthisattackmode,theattackercanarbitrarilyselectacertainamountofplaintextinadvance,encrypttheattackedencryptionalgorithm,andobtainthecorrespondingciphertext.Theattacker'sgoalistoobtainsomeinformationabouttheencryptionalgorithmthroughthisprocess,sothattheattackercanmoreeffectivelycracktheinformationencryptedbythesameencryptionalgorithm(andrelatedkeys)inthefuture.Intheworstcase,theattackercandirectlyobtainthekeyfordecryption.

Thisattackmodedoesnotseemrealisticatfirst,becauseitishardtoimaginethatanattackercanchooseanyinformationandasktheencryptionsystemtoencryptit.However,inpublickeycryptography,thisisaveryrealisticmodel.Thisisbecauseinthepublickeycryptographicscheme,theencryptionkeyispublic,soanattackercandirectlyuseittoencryptarbitraryinformation.

Selectciphertextattack

Skiptonavigationandjumptosearch

Incryptanalysis,SelectciphertextattackreferstoAnattackmethod.Theattackerhasaccesstothedecryptionmachineandcanconstructtheplaintextxcorrespondingtoanyciphertext.

Inthisattackmodel,thecryptanalystcollectsacertainamountofciphertextarbitrarilyinadvance,letstheseciphertextsbedecryptedthroughtheattackedencryptionalgorithm,andobtainsthedecryptedplaintextthroughanunknownkey.

Related Articles
TOP