An Entity of Type: WikicatCryptographicAttacks, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number of ciphertexts to be decrypted chosen adaptively, and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext. In an adaptive attack, the attacker is further allowed adaptive queries to be asked after the target is revealed (but the target query is disallowed). It is extending the indifferent (non-adaptive) chosen-ciphertext attack (CCA1) where the second stage of adaptive queries is not allowed. Charles Rackoff and Dan Simon defined CCA2 and suggested a system building on the non-adaptive CCA1 definition and system of Moni Naor and Moti Yung (which was the first treatment of chosen

Property Value
dbo:abstract
  • An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number of ciphertexts to be decrypted chosen adaptively, and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext. In an adaptive attack, the attacker is further allowed adaptive queries to be asked after the target is revealed (but the target query is disallowed). It is extending the indifferent (non-adaptive) chosen-ciphertext attack (CCA1) where the second stage of adaptive queries is not allowed. Charles Rackoff and Dan Simon defined CCA2 and suggested a system building on the non-adaptive CCA1 definition and system of Moni Naor and Moti Yung (which was the first treatment of chosen ciphertext attack immunity of public key systems). In certain practical settings, the goal of this attack is to gradually reveal information about an encrypted message, or about the decryption key itself. For public-key systems, adaptive-chosen-ciphertexts are generally applicable only when they have the property of ciphertext malleability — that is, a ciphertext can be modified in specific ways that will have a predictable effect on the decryption of that message. (en)
  • Um ataque de cifrotexto escolhido adaptativo (abreviado CCA2) é uma forma interativa de ataque de cifrotexto escolhido na qual o adversário envia um certo número de cifrotextos para serem decriptados, e então usa os resultados dessas decriptações para selecionar subsequentes cifrotextos. É uma forma de ataque distinta do ataque de cifrotexto escolhido indiferente (CCA1). O objetivo desse ataque é revelar gradualmente informações sobre uma mensagem encriptada, ou sobre a própria chave de decriptação. Para sistemas de chave-pública, cifrotextos-escolhidos adaptativos são, genericamente, aplicáveis apenas quando eles tem a propriedade da maleabilidade do cifrotexto — ou seja, o cifrotexto pode ser modificado em formas específicas e que terão um efeito previsível sobre a decriptação da mensagem. (pt)
dbo:wikiPageID
  • 426533 (xsd:integer)
dbo:wikiPageLength
  • 5408 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 1113381693 (xsd:integer)
dbo:wikiPageWikiLink
dbp:wikiPageUsesTemplate
dcterms:subject
gold:hypernym
rdf:type
rdfs:comment
  • An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker first sends a number of ciphertexts to be decrypted chosen adaptively, and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext. In an adaptive attack, the attacker is further allowed adaptive queries to be asked after the target is revealed (but the target query is disallowed). It is extending the indifferent (non-adaptive) chosen-ciphertext attack (CCA1) where the second stage of adaptive queries is not allowed. Charles Rackoff and Dan Simon defined CCA2 and suggested a system building on the non-adaptive CCA1 definition and system of Moni Naor and Moti Yung (which was the first treatment of chosen (en)
  • Um ataque de cifrotexto escolhido adaptativo (abreviado CCA2) é uma forma interativa de ataque de cifrotexto escolhido na qual o adversário envia um certo número de cifrotextos para serem decriptados, e então usa os resultados dessas decriptações para selecionar subsequentes cifrotextos. É uma forma de ataque distinta do ataque de cifrotexto escolhido indiferente (CCA1). (pt)
rdfs:label
  • Adaptive chosen-ciphertext attack (en)
  • Ataque de cifrotexto escolhido adaptativo (pt)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is dbo:wikiPageDisambiguates of
is dbo:wikiPageRedirects of
is dbo:wikiPageWikiLink of
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License