• A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts...
    11 KB (1,432 words) - 06:39, 30 October 2024
  • message they encrypt. The property of indistinguishability under chosen plaintext attack is considered a basic requirement for most provably secure public...
    15 KB (1,911 words) - 07:42, 9 October 2024
  • under chosen-ciphertext attack. For example, the El Gamal cryptosystem is semantically secure under chosen-plaintext attack, but this semantic security...
    9 KB (1,105 words) - 16:37, 29 July 2024
  • An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number...
    6 KB (728 words) - 08:41, 4 September 2024
  • Thumbnail for Cryptanalysis
    Known-plaintext: the attacker has a set of ciphertexts to which they know the corresponding plaintext. Chosen-plaintext (chosen-ciphertext): the attacker can...
    44 KB (5,215 words) - 23:19, 22 November 2024
  • cryptographic systems resist known plaintext or even chosen plaintext attacks, and so may not be entirely compromised when plaintext is lost or stolen. Older systems...
    6 KB (862 words) - 16:46, 22 May 2024
  • Thumbnail for Ciphertext
    Adaptive chosen-ciphertext attack Indifferent chosen-ciphertext attack Related-key attack: similar to a chosen-plaintext attack, except the attacker can obtain...
    9 KB (1,139 words) - 23:45, 27 October 2024
  • users. This is a known limitation of TLS as it is susceptible to chosen-plaintext attack against the application-layer data it was meant to protect. Earlier...
    179 KB (17,618 words) - 14:07, 15 November 2024
  • resistant to all chosen-plaintext attacks. Adaptive chosen-plaintext attack (CPA2) - in this attack the analyst can choose a sequence of plaintexts to be encrypted...
    11 KB (1,437 words) - 05:55, 30 January 2024
  • is severely insecure. There is a chosen-plaintext attack, effective for all block sizes, using 338 chosen plaintexts. For 3-byte blocks (typically used...
    4 KB (404 words) - 16:57, 27 September 2024
  • chosen plaintext attack (IND-CPA). When implemented with certain trapdoor permutations (e.g., RSA), OAEP is also proven to be secure against chosen ciphertext...
    9 KB (1,460 words) - 17:38, 1 June 2024
  • also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known. While active attackers can interact with the...
    6 KB (587 words) - 20:46, 15 December 2023
  • definition of security called ciphertext indistinguishability under chosen-plaintext attack. This latter definition is more common than the original definition...
    7 KB (851 words) - 06:22, 8 August 2024
  • Thumbnail for Block cipher mode of operation
    chosen-plaintext attack in many cases, since the attacker may be able to manipulate the entire IV–counter pair to cause a collision. Once an attacker...
    52 KB (5,878 words) - 15:11, 20 September 2024
  • messages m1 and m2 such that hash(m1) = hash(m2). More generally: Chosen-prefix collision attack Given two different prefixes p1 and p2, find two suffixes s1...
    17 KB (2,010 words) - 21:48, 17 May 2024
  • respective plaintexts. That is, m1em2e ≡ (m1m2)e (mod n). Because of this multiplicative property, a chosen-ciphertext attack is possible. E.g., an attacker who...
    60 KB (7,790 words) - 07:32, 21 November 2024
  • BREACH (category Chosen-plaintext attacks)
    compression makes no difference to BREACH, which can still perform a chosen-plaintext attack against the HTTP payload. As a result, clients and servers are...
    6 KB (701 words) - 09:02, 9 October 2024
  • Thumbnail for XXTEA
    weaknesses in the original Block TEA. XXTEA is vulnerable to a chosen-plaintext attack requiring 259 queries and negligible work. See cryptanalysis below...
    9 KB (1,115 words) - 08:11, 28 June 2024
  • also vulnerable to a known plaintext attack. However, a block cipher must not be vulnerable to a chosen plaintext attack to be considered secure. Therefore...
    10 KB (1,396 words) - 11:50, 4 October 2024
  • Thumbnail for Digital signature
    form of signature is existentially unforgeable, even against a chosen-plaintext attack.[clarification needed] There are several reasons to sign such a...
    45 KB (5,315 words) - 14:52, 6 November 2024
  • CRIME (redirect from CRIME attack)
    CVE-2012-4929. The vulnerability exploited is a combination of chosen plaintext attack and inadvertent information leakage through data compression, similar...
    8 KB (860 words) - 08:22, 9 October 2024
  • and is able to forward plaintext messages to Alice for encryption (in other words, Eve is capable of a chosen-plaintext attack). Now assume that Alice...
    14 KB (1,797 words) - 08:53, 7 September 2024
  • variable-length plaintext messages often have to be padded (expanded) to be compatible with the underlying cryptographic primitive. The attack relies on having...
    15 KB (1,792 words) - 08:57, 27 September 2024
  • cryptanalysis is usually a chosen plaintext attack, meaning that the attacker must be able to obtain ciphertexts for some set of plaintexts of their choosing....
    13 KB (1,688 words) - 16:36, 5 September 2024
  • Thumbnail for HTTP compression
    encoding. Compression allows a form of chosen plaintext attack to be performed: if an attacker can inject any chosen content into the page, they can know...
    17 KB (1,820 words) - 15:15, 21 August 2024
  • Gardening (cryptanalysis) (category Cryptographic attacks)
    crib-based decryption is usually not considered a chosen-plaintext attack, even though plain text effectively chosen by the British was injected into the ciphertext...
    4 KB (489 words) - 13:46, 18 September 2024
  • — for related-key attacks, how many related key queries are needed Attacks that lead to disclosure of the key or plaintext. Attacks that allow distinguishing...
    15 KB (801 words) - 01:34, 22 August 2024
  • N6-Cyclopentyladenosine, a drug Cyproterone acetate, a medication Chosen-plaintext attack, an attack model for cryptanalysis Co-citation Proximity Analysis, a...
    4 KB (543 words) - 21:26, 27 October 2024
  • Thumbnail for Digest access authentication
    These enhancements are designed to protect against, for example, chosen-plaintext attack cryptanalysis. If the algorithm directive's value is "MD5" or unspecified...
    24 KB (2,850 words) - 07:59, 12 November 2024
  • chosen plaintext attacks or even non-adaptive chosen ciphertext attacks (CCA1) while still being malleable. However, security against adaptive chosen...
    6 KB (983 words) - 01:57, 16 January 2024