- Attack model
Attack models or attack typesref|secondname specify how much information a cryptanalyst has access to when cracking an encrypted message. Some common attack models are:
*Ciphertext-only attack
*Known-plaintext attack
*Chosen-plaintext attack
*Chosen-ciphertext attack
**Adaptive chosen-ciphertext attack
**Indifferent chosen-ciphertext attack The ciphertext-only attack model is the weakest because it implies that the cryptanalyst has just the encoded message.Different attack models are used for other cryptographic primitives, or more generally for all kind of security systems. Examples for such attack models are:
*
Adaptive chosen-message attack fordigital signatures References
* [http://islab.oregonstate.edu/koc/ece575/notes/L2.ppt Information Security Laboratory] (powerpoint)
*cite book
author = Niels Ferguson
coauthors = Bruce Schneier
editor=Carol A. Long
year = 2003
title = Practical Cryptography
chapter = Introduction to Cryptography: Attacks
pages = 30-32
publisher = Wiley Publishing Inc
id=ISBN 0-471-22894-X
edition = HardcoverExternal links
* [http://serl.cs.colorado.edu/~alw/edu/SEprelim-src/Black-UNESCO01.pdf University of Colorado at Boulder's introduction to Cryptography and attack models] (PDF)
* [http://www.cacr.math.uwaterloo.ca/~dstinson/papers/polemic.ps University of Waterloo paper that discusses attack models] (Postscript file) [http://64.233.187.104/search?q=cache:IzBNB-_0GiEJ:www.cacr.math.uwaterloo.ca/~dstinson/papers/polemic.ps+%22attack+model%22+chosen+ciphertext+plaintext&hl=en&client=firefox-a html version]
Wikimedia Foundation. 2010.