A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts...
11 KB (1,432 words) - 06:39, 30 October 2024
Ciphertext indistinguishability (section Indistinguishability under chosen-plaintext attack (IND-CPA))
message they encrypt. The property of indistinguishability under chosen plaintext attack is considered a basic requirement for most provably secure public...
15 KB (1,911 words) - 07:42, 9 October 2024
under chosen-ciphertext attack. For example, the El Gamal cryptosystem is semantically secure under chosen-plaintext attack, but this semantic security...
9 KB (1,105 words) - 16:37, 29 July 2024
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number...
6 KB (728 words) - 08:41, 4 September 2024
Ciphertext (section Attack models)
Adaptive chosen-ciphertext attack Indifferent chosen-ciphertext attack Related-key attack: similar to a chosen-plaintext attack, except the attacker can obtain...
9 KB (1,139 words) - 23:45, 27 October 2024
cryptographic systems resist known plaintext or even chosen plaintext attacks, and so may not be entirely compromised when plaintext is lost or stolen. Older systems...
6 KB (862 words) - 16:46, 22 May 2024
Cryptanalysis (redirect from Cryptanalytic attack)
Known-plaintext: the attacker has a set of ciphertexts to which they know the corresponding plaintext. Chosen-plaintext (chosen-ciphertext): the attacker can...
44 KB (5,215 words) - 00:50, 14 October 2024
Transport Layer Security (redirect from BEAST attack)
users. This is a known limitation of TLS as it is susceptible to chosen-plaintext attack against the application-layer data it was meant to protect. Earlier...
179 KB (17,618 words) - 00:47, 8 November 2024
resistant to all chosen-plaintext attacks. Adaptive chosen-plaintext attack (CPA2) - in this attack the analyst can choose a sequence of plaintexts to be encrypted...
11 KB (1,437 words) - 05:55, 30 January 2024
is severely insecure. There is a chosen-plaintext attack, effective for all block sizes, using 338 chosen plaintexts. For 3-byte blocks (typically used...
4 KB (404 words) - 16:57, 27 September 2024