| |
Schematic of basic attacks | page 6 of 12 |
An attacker might take a number of approaches in
breaking a protocol. The protocol itself -- and also the
consistency with which it is followed -- will affect which
attacks are possible in a given case. The attacks described in the
next panel are all most relevant to encryption protocols as such, and
only indirect to other sorts of protocols that might be
compromised (for example, digital signatures, online secure betting,
authentication, secret sharing; some of these other protocols
might still involve regular encryption in some of their
steps). This tutorial will not attempt to detail just how
each of these attacks might proceed (it depends on too many
non-general issues); but in a general way, the fewer angles
for attacks a protocol leaves open, the more secure it is
likely to be.
|