15
Known plain text Adaptive chosen plain text Chosen plain text Chosen ciphertext
Adaptive chosen plain text
Stream Cryptanalysis Steganography Block
Block
Chosen plain text Brute force Known plain text Chosen ciphertext
Chosen plain text
Integral Dictionary Linear Differential
Integral
Uses symmetric encryption. Is suitable for small amounts of data and small devices, such as smartphones. Uses multiplication of large prime numbers. Is used to sign a certificate using a private key and to verify a certificate using a public key.
Is suitable for small amounts of data and small devices, such as smartphones.
Known plain text Chosen plain text Chosen ciphertext Brute force
Known plain text
Sam's public key Mary's public key Mary's private key Sam's private key
Mary's private key
Symmetric Asymmetric Block cipher Digital signature
Symmetric
To recover the encryption key. To extract cryptographic secrets. To find patterns in the output. To construct a dictionary.
To recover the encryption key.
Uses the Rijndael block cipher. Uses up to 16 rounds of substitution and transposition. Is used by Pretty Good Privacy (PGP) email encryption. Is easy to break.
Uses the Rijndael block cipher.
ciphertext encryption algorithm plain text steganography
ciphertext
Request a certificate from GoDaddy. Enable synchronous encryption in her network. Ensure all HTTP traffic uses port 443. Create a local CA and generate a self-signed certificate.
Create a local CA and generate a self-signed certificate.
Cryptographic algorithm Public keys Hash values Private keys
Private keys
Trickery attack Rubber hose attack Social engineering attack Brute force attack
Rubber hose attack
They test every possible valid combination. They are platform-independent. They are fast. They can be performed in a distributed parallel processing environment.
They test every possible valid combination.
Uses only one key to encrypt and decrypt data. Uses only one algorithm type. Does not require the exchange of the shared secret key. Does not work well for bulk encryption of less sensitive data.
Uses only one key to encrypt and decrypt data.
Finds the affine approximations to the action of a cipher. A form of cryptanalysis applicable to symmetric key algorithms. Is useful against block ciphers base on substitution-permutation networks. It is an extension of differential cryptanalysis. It is commonly used on block ciphers and works on statistical differences between plain text and ciphertext. Works on statistical differences between ciphertexts of chosen data.
LC DC IC IC LC DC
He must send identifying data and a private key request to a validation authority (VA). He must send identifying data and the encryption algorithm he will use with his certificate request to a certificate authority (CA). He must send identifying data with his certificate request to a registration authority (RA). He must send the MAC and IP addresses with his certificate to a root certificate authority (CA).
He must send identifying data with his certificate request to a registration authority (RA).
** The attack repeatedly measuring the exact execution times of modular exponentiation operations. A hacker extracts cryptographic secrets, such as the password to an encrypted file, by coercion or torture. The hacker makes a series of interactive queries, choosing subsequent plain texts based on the information from the previous encryptions. An attack where a hacker not only breaks a ciphertext, but also breaks into a bigger system that is dependent on that ciphertext. The hacker obtains ciphertexts encrypted under two different keys. The hacker analyzes the plain texts corresponding to an arbitrary set of ciphertexts the hacker chooses.
T RH ACPT CK RK CC