SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
William Stallings
Chapter:
Classical Encryption Techniques
Exercise:
Review Questions
Question:6 | ISBN:9781292158587 | Edition: 7

Question

List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

There are Five types of Cryptanalys attacks which are


1. Ciphertext only
2. Known plaintext
3. Chosen plaintext
4. Chosen ciphertext
5. Chosen text

 

Brief Explanations:


Ciphertext only:
In this type of attack, the cryptanalyst/attacker knows the Encryption algorithm as well as Ciphertext. and in many cases, he might know some plain texts too. however, This type of attack is said to be the hardest of all, because he has very little know information to crack the secret key.

 

Known plaintext:
In this type of attack, the cryptanalyst knows encryption algorithm, cyphertext, as well as One or more plaintext–ciphertext pairs formed by the private key.
by using this information the attacker may be able to deduce the key based on how the known plaintext is transformed.

 

Chosen plaintext:
In this type of attack, the attacker knows the encryption algorithm, and Plaintext message chosen by the cryptanalyst, together with its corresponding ciphertext generated with the secret key.
If the analyst is able somehow to get the source system to insert into the system a message chosen by the analyst, then a chosen-plaintext attack is possible. 

 

Chosen ciphertext:
The attacker knows, Encryption algorithm and Ciphertext chosen by the cryptanalyst together with its associated decrypted plaintext generated with the secret key and analyze this information to deduce the secret key.

 

Chosen text:


 In this method, the attacker knows,

  •  Encryption algorithm, 
  • Ciphertext, 
  • A plaintext message is chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key
  • Ciphertext chose by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key.

The attacker use the above information to deduce the key.

 

However, Chosen text and chosen-ciphertext are less commonly used Cryptanlystic techniques, but still, they are possible ways for the attack.

0 0

Discussions

Post the discussion to improve the above solution.