Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Ciphertext
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Attack models === * [[Ciphertext-only attack|Ciphertext-only]]: the cryptanalyst has access only to a collection of ciphertexts or code texts. This is the weakest attack model because the cryptanalyst has limited information. Modern ciphers rarely fail under this attack.<ref>{{cite book |last=Schneier |first=Bruce |url=https://archive.org/details/secretsliesdigit00schn/page/90 |title=Secrets & Lies |date=28 August 2000 |publisher=Wiley Computer Publishing Inc |isbn=0-471-25311-1 |pages=[https://archive.org/details/secretsliesdigit00schn/page/90 90β91]}}</ref> * [[Known-plaintext attack|Known-plaintext]]: the attacker has a set of ciphertexts to which they know the corresponding plaintext * [[Chosen-plaintext attack]]: the attacker can obtain the ciphertexts corresponding to an arbitrary set of plaintexts of their own choosing ** Batch chosen-plaintext attack: where the cryptanalyst chooses all plaintexts before any of them are encrypted. This is often the meaning of an unqualified use of "chosen-plaintext attack". ** Adaptive chosen-plaintext attack: where the cryptanalyst makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions. * [[Chosen-ciphertext attack]]: the attacker can obtain the plaintexts corresponding to an arbitrary set of ciphertexts of their own choosing ** [[Adaptive chosen-ciphertext attack]] ** [[Indifferent chosen-ciphertext attack]] * [[Related-key attack]]: similar to a chosen-plaintext attack, except the attacker can obtain ciphertexts encrypted under two different keys. The keys are unknown, but the relationship between them is known (e.g., two keys that differ in the one bit).
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)