Attack model explained

In cryptanalysis, attack models or attack types[1] are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a system under attack when attempting to "break" an encrypted message (also known as ciphertext) generated by the system. The greater the access the cryptanalyst has to the system, the more useful information they can get to utilize for breaking the cypher.

In cryptography, a sending party uses a cipher to encrypt (transform) a secret plaintext into a ciphertext, which is sent over an insecure communication channel to the receiving party. The receiving party uses an inverse cipher to decrypt the ciphertext to obtain the plaintext. A secret knowledge is required to apply the inverse cipher to the ciphertext. This secret knowledge is usually a short number or string called a key. In a cryptographic attack a third party cryptanalyst analyzes the ciphertext to try to "break" the cipher, to read the plaintext and obtain the key so that future enciphered messages can be read. It is usually assumed that the encryption and decryption algorithms themselves are public knowledge and available to the cryptographer, as this is the case for modern ciphers which are published openly. This assumption is called Kerckhoffs's principle.

Models

Some common attack models are:

Different attack models are used for other cryptographic primitives, or more generally for all kind of security systems. Examples for such attack models are:

Further reading

Notes and References

  1. https://web.archive.org/web/20060902081253/http://islab.oregonstate.edu/koc/ece575/notes/L2.ppt Information Security Laboratory
  2. Book: Bruce Schneier. 2000. Secrets & Lies: Digital Security in a Networked World. Cryptography. 90–91. Wiley Computer Publishing Inc.. 0-471-25311-1. Hardcover. registration. https://archive.org/details/secretsliesdigit00schn/page/90.
  3. [Gordon Welchman]
  4. Michael Smith, "How It Began: Bletchley Park Goes to War," in B. Jack Copeland, ed., Colossus: The Secrets of Bletchley Park's Codebreaking Computers.
  5. Towards Understanding the Known-Key Security of Block Ciphers . Elena Andreeva . Andrey Bogdanov . Bart Mennink . 8 July 2014 . FSE 2014 .