Key-recovery attack (original) (raw)
A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Normally this means that the attacker has a pair, or more than one pair, of plaintext message and the corresponding ciphertext. Historically, cryptanalysis of block ciphers has focused on key-recovery, but security against these sorts of attacks is a very weak guarantee since it may not be necessary to recover the key to obtain partial information about the message or decrypt message entirely. Modern cryptography uses more robust notions of security. Recently, indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2 security) has become the "golden standard" of security. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often hav
Property | Value |
---|---|
dbo:abstract | A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Normally this means that the attacker has a pair, or more than one pair, of plaintext message and the corresponding ciphertext. Historically, cryptanalysis of block ciphers has focused on key-recovery, but security against these sorts of attacks is a very weak guarantee since it may not be necessary to recover the key to obtain partial information about the message or decrypt message entirely. Modern cryptography uses more robust notions of security. Recently, indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2 security) has become the "golden standard" of security. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often have a key space of size or greater, making such attacks infeasible with current technology. (en) |
dbo:wikiPageExternalLink | http://cseweb.ucsd.edu/~mihir/papers/gb.html |
dbo:wikiPageID | 30662489 (xsd:integer) |
dbo:wikiPageLength | 2710 (xsd:nonNegativeInteger) |
dbo:wikiPageRevisionID | 1047206347 (xsd:integer) |
dbo:wikiPageWikiLink | dbr:Algorithm dbr:Computer_security dbr:Cryptography dbr:Plaintext dbr:Key_(cryptography) dbc:Cryptographic_attacks dbc:Theory_of_cryptography dbr:Cipher dbr:Ciphertext dbr:Ciphertext_indistinguishability dbr:Exhaustive_key_search dbr:Computational_resources |
dbp:wikiPageUsesTemplate | dbt:Reflist dbt:Rp dbt:Crypto-stub |
dct:subject | dbc:Cryptographic_attacks dbc:Theory_of_cryptography |
rdf:type | yago:WikicatCryptographicAttacks yago:Abstraction100002137 yago:Act100030358 yago:Activity100407535 yago:Attack100972621 yago:Event100029378 yago:Operation100955060 yago:PsychologicalFeature100023100 yago:YagoPermanentlyLocatedEntity |
rdfs:comment | A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Normally this means that the attacker has a pair, or more than one pair, of plaintext message and the corresponding ciphertext. Historically, cryptanalysis of block ciphers has focused on key-recovery, but security against these sorts of attacks is a very weak guarantee since it may not be necessary to recover the key to obtain partial information about the message or decrypt message entirely. Modern cryptography uses more robust notions of security. Recently, indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2 security) has become the "golden standard" of security. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often hav (en) |
rdfs:label | Key-recovery attack (en) |
owl:sameAs | freebase:Key-recovery attack yago-res:Key-recovery attack wikidata:Key-recovery attack https://global.dbpedia.org/id/4pbrg |
prov:wasDerivedFrom | wikipedia-en:Key-recovery_attack?oldid=1047206347&ns=0 |
foaf:isPrimaryTopicOf | wikipedia-en:Key-recovery_attack |
is dbo:wikiPageRedirects of | dbr:KR_advantage dbr:Key-Recovery_Advantage dbr:Key-Recovery_advantage dbr:Key-recovery_advantage dbr:Key_recovery_attack |
is dbo:wikiPageWikiLink of | dbr:Index_of_cryptography_articles dbr:Advanced_Encryption_Standard dbr:KR_advantage dbr:Supersingular_isogeny_key_exchange dbr:ISO/IEC_9797-1 dbr:Key-Recovery_Advantage dbr:Key-Recovery_advantage dbr:Key-recovery_advantage dbr:Key_recovery_attack |
is foaf:primaryTopic of | wikipedia-en:Key-recovery_attack |