Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
4. Cryptanalysis
  


Schematic of "exotic" attacks page 8 of 12


A few less commonly available attacks can add significantly to Mallory's chances of success:

Adaptive chosen plain text: This attack is just a more specialized version of a general chosen plain text attack. Each time Mallory inserts one chosen plain text and intercepts its encrypted version, he determines some statistical property of the encryption. Later chosen plain texts are selected in order to exercise different properties of the encryption.

Chosen key: An attacker might have a means of encrypting messages using a specified key. Or the specified key might only have certain desired properties. For example, if a key is indirectly derived from a different part of the protocol, an attacker might be able to hack that other part of the protocol, creating usable key properties.

Chosen cipher text: An attacker might be able to determine how selected cipher texts become decrypted. For example, Mallory might spoof an encrypted message from Bob to Alice. Upon attempting to decrypt the message, Alice will wind up with gibberish. But Alice might then mail this gibberish back to Bob or store it in an insecure way. By choosing cipher texts (or really pseudo-cipher texts) with desired properties, Mallory might gain insight into the actual decryption.


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact