0% found this document useful (0 votes)
134 views

Cryptanalysis and Types of Attacks

There are five main types of cryptanalytic attacks: 1) Known-plaintext analysis uses known plaintext-ciphertext pairs to deduce the encryption key. 2) Chosen-plaintext analysis involves the attacker choosing random plaintexts to obtain ciphertexts to find the key. 3) Ciphertext-only analysis only uses ciphertexts to find the corresponding plaintext and key, making it the hardest attack. 4) Man-in-the-middle attacks intercept messages between communicating parties through a secure channel. 5) Adaptive chosen-plaintext analysis is similar to chosen-plaintext but allows additional plaintexts after initial ciphertexts.

Uploaded by

Sourav Debnath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

Cryptanalysis and Types of Attacks

There are five main types of cryptanalytic attacks: 1) Known-plaintext analysis uses known plaintext-ciphertext pairs to deduce the encryption key. 2) Chosen-plaintext analysis involves the attacker choosing random plaintexts to obtain ciphertexts to find the key. 3) Ciphertext-only analysis only uses ciphertexts to find the corresponding plaintext and key, making it the hardest attack. 4) Man-in-the-middle attacks intercept messages between communicating parties through a secure channel. 5) Adaptive chosen-plaintext analysis is similar to chosen-plaintext but allows additional plaintexts after initial ciphertexts.

Uploaded by

Sourav Debnath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptanalysis and Types of Attacks

Cryptology has two parts namely, Cryptography which focuses on creating secret codes and Cryptanalysis
which is the study of the cryptographic algorithm and the breaking of those secret codes. The person practicing
Cryptanalysis is called a Cryptanalyst. It helps us to better understand the cryptosystems and also helps us
improve the system by finding any weak point and thus work on the algorithm to create a more secure secret
code. For example, a Cryptanalyst might try to decipher a ciphertext to derive the plaintext. It can help us to
deduce the plaintext or the encryption key.

Parts Of Cryptology

To determine the weak points of a cryptographic system, it is important to attack the system. These attacks
are called Cryptanalytic attacks. The attacks rely on nature of the algorithm and also knowledge of the general
characteristics of the plaintext, i.e., plaintext can be a regular document written in English or it can be a code
written in Java. Therefore, nature of the plaintext should be known before trying to use the attacks.

Types of Cryptanalytic attacks:

The Five Types of Cryptanalytic Attacks

Known-Plaintext Analysis (KPA) :


In this type of attack, some plaintext-ciphertext pairs are already known. Attacker maps them in order to find
the encryption key. This attack is easier to use as a lot of information is already available.

Chosen-Plaintext Analysis (CPA) :


In this type of attack, the attacker chooses random plaintexts and obtains the corresponding ciphertexts and
tries to find the encryption key. Its very simple to implement like KPA but the success rate is quite low.
Ciphertext-Only Analysis (COA) :
In this type of attack, only some cipher-text is known and the attacker tries to find the corresponding
encryption key and plaintext. Its the hardest to implement but is the most probable attack as only ciphertext is
required.
Man-In-The-Middle (MITM) attack :
In this type of attack, attacker intercepts the message/key between two communicating parties through a
secured channel.
Adaptive Chosen-Plaintext Analysis (ACPA) :
This attack is similar CPA. Here, the attacker requests the cipher texts of additional plaintexts after they have
ciphertexts for some texts.

Source: https://www.geeksforgeeks.org/cryptanalysis-and-types-of-attacks/

What are the attacks on DES in Information Security?


There are various attacks on DES which are as follows −

Differential Cryptanalysis − The main objective of differential cryptanalysis is to view for statistical
distributions and patterns in ciphertext to provide deduce element about the key used in the cipher.
Differential cryptanalysis is a section of study in cryptography that compares the method differences in input
associated to the differences in encrypted output. It can be used basically in the study of block ciphers to
decide if changes in plaintext result in any non-random outcomes in the encrypted ciphertext.
Related-Key Cryptanalysis − Related-key cryptanalysis consider that the attacker understands the encryption
of specific plaintexts not only under the original (unknown) key K, but also below some derived keys K0 = f
(K).
In a chosen-related key attack, the attacker defines how the key is to be modified and known-related-key
attacks are those where the key difference is acknowledged, but cannot be selected by the attacker.
It can emphasize that the attacker understands or select the relationship between keys, and not only the actual
key values.
Related-key cryptanalysis is a factual attack on key-exchange protocols that do not provide key-integrity an
attacker can be capable to ip bits in the key without understanding the keypad key-update protocols that update
keys utilizing a known function such as K, K + 1, K + 2, etc. Related-key attacks were also utilized against
rotor devices such as operators consistently set rotors incorrectly.
Linear Cryptanalysis − Linear cryptanalysis is a general form of cryptanalysis depend on discovering affine
approximations to the element of a cipher. Attacks have been produced for block ciphers and stream ciphers.
Linear cryptanalysis is one of the two most generally used attacks on block ciphers and the other being
differential cryptanalysis. Linear approximate equations is depend on the best (n-2) round expression, and
dependability of the key candidates changed from these equations. The former decrease the number of needed
plaintexts, whereas the latter enhance the success rate of the attack.

Brute Force Attack − In cryptanalysis, a brute force attack is an approach of defeating a cryptographic scheme
by attempting a huge number of possibilities.
For example, it can be exhaustively working through all possible keys in order to decode a message. The
selection of an appropriate key length based on the practical feasibility of implementing a brute force attack.
For symmetric-key ciphers, a brute force attack generally means a brute-force search of the key area; that is,
checking all possible keys in order to find the plaintext used to create a specific cipher text.

In a brute force attack, the expected number of trials before the proper key is discovered is similar to half the
size of the key space. For instance, if there are 264 possible keys, a brute force attack can generally be normal
to discover a key after 263 trials.
If keys are generated in a weak method. For example, it can be derived from a guessable-password, and it is
applicable to exhaustively search over a much smaller set, and keys generated from passwords in a dictionary.

Source: https://www.tutorialspoint.com/what-are-the-attacks-on-des-in-information-security

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy