Adaptive chosen-ciphertext attack

http://dbpedia.org/resource/Adaptive_chosen-ciphertext_attack an entity of type: WikicatCryptographicAttacks

An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number of ciphertexts to be decrypted chosen adaptively, and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext. In an adaptive attack, the attacker is further allowed adaptive queries to be asked after the target is revealed (but the target query is disallowed). It is extending the indifferent (non-adaptive) chosen-ciphertext attack (CCA1) where the second stage of adaptive queries is not allowed. Charles Rackoff and Dan Simon defined CCA2 and suggested a system building on the non-adaptive CCA1 definition and system of Moni Naor and Moti Yung (which was the first treatment of chosen rdf:langString
Um ataque de cifrotexto escolhido adaptativo (abreviado CCA2) é uma forma interativa de ataque de cifrotexto escolhido na qual o adversário envia um certo número de cifrotextos para serem decriptados, e então usa os resultados dessas decriptações para selecionar subsequentes cifrotextos. É uma forma de ataque distinta do ataque de cifrotexto escolhido indiferente (CCA1). rdf:langString
rdf:langString Adaptive chosen-ciphertext attack
rdf:langString Ataque de cifrotexto escolhido adaptativo
xsd:integer 426533
xsd:integer 1113381693
rdf:langString An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number of ciphertexts to be decrypted chosen adaptively, and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext. In an adaptive attack, the attacker is further allowed adaptive queries to be asked after the target is revealed (but the target query is disallowed). It is extending the indifferent (non-adaptive) chosen-ciphertext attack (CCA1) where the second stage of adaptive queries is not allowed. Charles Rackoff and Dan Simon defined CCA2 and suggested a system building on the non-adaptive CCA1 definition and system of Moni Naor and Moti Yung (which was the first treatment of chosen ciphertext attack immunity of public key systems). In certain practical settings, the goal of this attack is to gradually reveal information about an encrypted message, or about the decryption key itself. For public-key systems, adaptive-chosen-ciphertexts are generally applicable only when they have the property of ciphertext malleability — that is, a ciphertext can be modified in specific ways that will have a predictable effect on the decryption of that message.
rdf:langString Um ataque de cifrotexto escolhido adaptativo (abreviado CCA2) é uma forma interativa de ataque de cifrotexto escolhido na qual o adversário envia um certo número de cifrotextos para serem decriptados, e então usa os resultados dessas decriptações para selecionar subsequentes cifrotextos. É uma forma de ataque distinta do ataque de cifrotexto escolhido indiferente (CCA1). O objetivo desse ataque é revelar gradualmente informações sobre uma mensagem encriptada, ou sobre a própria chave de decriptação. Para sistemas de chave-pública, cifrotextos-escolhidos adaptativos são, genericamente, aplicáveis apenas quando eles tem a propriedade da maleabilidade do cifrotexto — ou seja, o cifrotexto pode ser modificado em formas específicas e que terão um efeito previsível sobre a decriptação da mensagem.
xsd:nonNegativeInteger 5408

data from the linked data cloud