A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts...
11 KB (1,432 words) - 06:39, 30 October 2024
Ciphertext indistinguishability (section Indistinguishability under chosen-plaintext attack (IND-CPA))
message they encrypt. The property of indistinguishability under chosen plaintext attack is considered a basic requirement for most provably secure public...
15 KB (1,911 words) - 07:42, 9 October 2024
under chosen-ciphertext attack. For example, the El Gamal cryptosystem is semantically secure under chosen-plaintext attack, but this semantic security...
9 KB (1,105 words) - 16:37, 29 July 2024
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number...
6 KB (728 words) - 08:41, 4 September 2024
Cryptanalysis (redirect from Cryptanalytic attack)
Known-plaintext: the attacker has a set of ciphertexts to which they know the corresponding plaintext. Chosen-plaintext (chosen-ciphertext): the attacker can...
44 KB (5,215 words) - 23:19, 22 November 2024
cryptographic systems resist known plaintext or even chosen plaintext attacks, and so may not be entirely compromised when plaintext is lost or stolen. Older systems...
6 KB (862 words) - 16:46, 22 May 2024
Ciphertext (section Attack models)
Adaptive chosen-ciphertext attack Indifferent chosen-ciphertext attack Related-key attack: similar to a chosen-plaintext attack, except the attacker can obtain...
9 KB (1,139 words) - 23:45, 27 October 2024
Transport Layer Security (redirect from BEAST attack)
users. This is a known limitation of TLS as it is susceptible to chosen-plaintext attack against the application-layer data it was meant to protect. Earlier...
179 KB (17,618 words) - 14:07, 15 November 2024
resistant to all chosen-plaintext attacks. Adaptive chosen-plaintext attack (CPA2) - in this attack the analyst can choose a sequence of plaintexts to be encrypted...
11 KB (1,437 words) - 05:55, 30 January 2024
is severely insecure. There is a chosen-plaintext attack, effective for all block sizes, using 338 chosen plaintexts. For 3-byte blocks (typically used...
4 KB (404 words) - 16:57, 27 September 2024
chosen plaintext attack (IND-CPA). When implemented with certain trapdoor permutations (e.g., RSA), OAEP is also proven to be secure against chosen ciphertext...
9 KB (1,460 words) - 17:38, 1 June 2024
also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known. While active attackers can interact with the...
6 KB (587 words) - 20:46, 15 December 2023
definition of security called ciphertext indistinguishability under chosen-plaintext attack. This latter definition is more common than the original definition...
7 KB (851 words) - 06:22, 8 August 2024
chosen-plaintext attack in many cases, since the attacker may be able to manipulate the entire IV–counter pair to cause a collision. Once an attacker...
52 KB (5,878 words) - 15:11, 20 September 2024
messages m1 and m2 such that hash(m1) = hash(m2). More generally: Chosen-prefix collision attack Given two different prefixes p1 and p2, find two suffixes s1...
17 KB (2,010 words) - 21:48, 17 May 2024
RSA (cryptosystem) (redirect from Branch prediction analysis attacks)
respective plaintexts. That is, m1em2e ≡ (m1m2)e (mod n). Because of this multiplicative property, a chosen-ciphertext attack is possible. E.g., an attacker who...
60 KB (7,790 words) - 07:32, 21 November 2024
BREACH (category Chosen-plaintext attacks)
compression makes no difference to BREACH, which can still perform a chosen-plaintext attack against the HTTP payload. As a result, clients and servers are...
6 KB (701 words) - 09:02, 9 October 2024
weaknesses in the original Block TEA. XXTEA is vulnerable to a chosen-plaintext attack requiring 259 queries and negligible work. See cryptanalysis below...
9 KB (1,115 words) - 08:11, 28 June 2024
also vulnerable to a known plaintext attack. However, a block cipher must not be vulnerable to a chosen plaintext attack to be considered secure. Therefore...
10 KB (1,396 words) - 11:50, 4 October 2024
Digital signature (redirect from Adaptive chosen-message attack)
form of signature is existentially unforgeable, even against a chosen-plaintext attack.[clarification needed] There are several reasons to sign such a...
45 KB (5,315 words) - 14:52, 6 November 2024
CRIME (redirect from CRIME attack)
CVE-2012-4929. The vulnerability exploited is a combination of chosen plaintext attack and inadvertent information leakage through data compression, similar...
8 KB (860 words) - 08:22, 9 October 2024
and is able to forward plaintext messages to Alice for encryption (in other words, Eve is capable of a chosen-plaintext attack). Now assume that Alice...
14 KB (1,797 words) - 08:53, 7 September 2024
variable-length plaintext messages often have to be padded (expanded) to be compatible with the underlying cryptographic primitive. The attack relies on having...
15 KB (1,792 words) - 08:57, 27 September 2024
Differential cryptanalysis (redirect from Differential attack)
cryptanalysis is usually a chosen plaintext attack, meaning that the attacker must be able to obtain ciphertexts for some set of plaintexts of their choosing....
13 KB (1,688 words) - 16:36, 5 September 2024
encoding. Compression allows a form of chosen plaintext attack to be performed: if an attacker can inject any chosen content into the page, they can know...
17 KB (1,820 words) - 15:15, 21 August 2024
Gardening (cryptanalysis) (category Cryptographic attacks)
crib-based decryption is usually not considered a chosen-plaintext attack, even though plain text effectively chosen by the British was injected into the ciphertext...
4 KB (489 words) - 13:46, 18 September 2024
— for related-key attacks, how many related key queries are needed Attacks that lead to disclosure of the key or plaintext. Attacks that allow distinguishing...
15 KB (801 words) - 01:34, 22 August 2024
N6-Cyclopentyladenosine, a drug Cyproterone acetate, a medication Chosen-plaintext attack, an attack model for cryptanalysis Co-citation Proximity Analysis, a...
4 KB (543 words) - 21:26, 27 October 2024
These enhancements are designed to protect against, for example, chosen-plaintext attack cryptanalysis. If the algorithm directive's value is "MD5" or unspecified...
24 KB (2,850 words) - 07:59, 12 November 2024
chosen plaintext attacks or even non-adaptive chosen ciphertext attacks (CCA1) while still being malleable. However, security against adaptive chosen...
6 KB (983 words) - 01:57, 16 January 2024