Professional Documents
Culture Documents
A10 Members:
2) Known PlainText
In this attack, the cryptanalyst knows the cypher text as well as some plain text and
some knowledge of encryption algorithm formed because of the secret key and based on
this knowledge the attacker will try to find what is the key use to generate the
cyphertext.
3) Chosen PlainText
In this type of attack the main motive of the attacker will be to know the plain text. The
attacker in this scenario will have temporary amount of access to the encryption algorithm
and he will try to feed some plain text and try to get the cypher text, now the attacker has
both pairs plain text and cypher text so he can guess the plain text.
4) Chosen CypherText
In this type of attack Lets say that the attacker has some temporary access to the
decryption algorithm, Now the attacker already has some cypher text with him because he
is in the network of the sender. Now what the attacker will do is he will give that
cyphertext to the decryption algorithm in order to generate some plaintext. Now the
attacker has cypher text and decrypted plaintext. So he can guess the plain text with that
knowledge.
5) Chosen Text
It is nothing but the combination of Chosen Plain Text and Chosen CypherText attack.
2) What is Brute force attack?
Brute Force attack consists of an attacker submitting
many passwords with the hope of eventually guessing
correcting. The attacker systematically checks all
possible passwords until the correct one is found.
www.simplylearn.com
www.google.com
www.google.com
www.studymafia.org
Thanks…!!!
Any Query