O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacks on cryptography

The following are classes of attacks on cryptography. They describe how much information and access the attacker has while actively attacking the cryptosystem. The attacker’s goal is to crack (reveal) the encryption keys, decryption keys, or both.

Ciphertext-only attack

When all is designed and implemented in its best forms, a cryptosystem shows only one thing to the unauthorized bad guys: ciphertext. The bad guys have no information about the plaintext data or the nature of the keys the cryptosystem uses. This is the good guy’s strongest position and the bad guy’s weakest position. Considering that the bad guy wants to steal your messages and crack your keys, put the bad guy in this position whenever you can.

Known plaintext ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required