Cryptographic attacks

In order to retrieve the plaintexts of information, attackers and cryptanalysts are using many techniques:

  • Brute force attack (BFA): During this attack, the attacker will try all the key combinations to retrieve the key 
  • Dictionary attack: In this attack, the attacker uses prepared dictionaries and tries the words in them
  • Birthday attack: In the birthday attack, the attacker uses hash collision
  • Ciphertext only attack (COA): In this attack, the attacker possesses the ciphertexts, and he only needs to determine the key
  • Known plaintext attack (KPA): The attacker uses what we call linear cryptanalysis to retrieve the missing plaintexts from ciphers, while he knows some partially plaintexts of the cipher
  • Chosen plaintext ...

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.