词条 | Chosen-plaintext attack |
释义 |
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.[1] The goal of the attack is to gain information that reduces the security of the encryption scheme. Modern ciphers aim to provide semantic security, also known as ciphertext indistinguishability under chosen-plaintext attack, and are therefore by design generally immune to chosen-plaintext attacks if correctly implemented. IntroductionIn a chosen-plaintext attack the adversary can (possibly adaptively) ask for the ciphertexts of arbitrary plaintext messages. This is formalized by allowing the adversary to interact with an encryption oracle, viewed as a black box. The attacker’s goal is to reveal all or part of the secret encryption key. It may seem infeasible in practice that an attacker could obtain ciphertexts for given plaintexts. However, modern cryptography is implemented in software or hardware and is used for a diverse range of applications; for many cases, a chosen-plaintext attack is often very feasible (see also #In practice). Chosen-plaintext attacks become extremely important in the context of public key cryptography, where the encryption key is public and so attackers can encrypt any plaintext they choose. Different formsThere are two forms of chosen-plaintext attacks:
General method of an attackA general batch chosen-plaintext attack is carried out as follows {{Failed verification|date=February 2019}}:
Consider the following extension of the above situation. After the last step,
A cipher has indistinguishable encryptions under a chosen-plaintext attack if after running the above experiment with {{var|n}}=1 {{Failed verification|date=February 2019}} the adversary can't guess correctly ({{var|b}}={{var|b'}}) with probability non-negligibly better than 1/2.[2] ExamplesThe following examples demonstrate how some ciphers that meet other security definitions may be broken with a chosen-plaintext attack. Caesar cipherThe following attack on the Caesar cipher allows full recovery of the secret key:
With more intricate or complex encryption methodologies the decryption method becomes more resource-intensive, however, the core concept is still relatively the same. One-time padsThe following attack on the one-time pad allows full recovery of the secret key. Suppose the message length and key length are equal to {{var|n}}.
In practiceIn World War II US Navy cryptanalysts discovered that Japan was planning to attack a location referred to as "AF". They believed that "AF" might be Midway Island, because other locations in the Hawaiian Islands had codewords that began with "A". To prove their hypothesis that "AF" corresponded to "Midway Island" they asked the US forces at Midway to send a plaintext message about low supplies. The Japanese intercepted the message and immediately reported to their superiors that "AF" was low on water, confirming the Navy's hypothesis and allowing them to position their force to win the battle.[2][3] Also during World War II, Allied codebreakers at Bletchley Park would sometimes ask the Royal Air Force to lay mines at a position that didn't have any abbreviations or alternatives in the German naval system's grid reference. The hope was that the Germans, seeing the mines, would use an Enigma machine to encrypt a warning message about the mines and an "all clear" message after they were removed, giving the allies enough information about the message to break the German naval Enigma. This process of planting a known-plaintext was called gardening.[4] Allied codebreakers also helped craft messages sent by double agent Juan Pujol García, whose encrypted radio reports were received in Madrid, manually decrypted, and then re-encrypted with an Enigma machine for transmission to Berlin.[5] This helped the codebreakers decrypt the code used on the second leg, having supplied the original text.[6] In modern day, chosen-plaintext attacks (CPAs) are often used to break symmetric ciphers. To be considered CPA-secure, the symmetric cipher must not be vulnerable to chosen-plaintext attacks. Thus, it is important for symmetric cipher implementors to understand how an attacker would attempt to break their cipher and make relevant improvements. For some chosen-plaintext attacks, only a small part of the plaintext may need to be chosen by the attacker; such attacks are known as plaintext injection attacks. Relation to other attacksA chosen-plaintext attack is more powerful than known-plaintext attack, because the attacker can directly target specific terms or patterns without having to wait for these to appear naturally, allowing faster gathering of data relevant to cryptanalysis. Therefore, any cipher that prevents chosen-plaintext attacks is also secure against known-plaintext and ciphertext-only attacks. However, a chosen-plaintext attack is less powerful than a chosen-ciphertext attack, where the attacker can obtain the plaintexts of arbitrary ciphertexts. A CCA-attacker can sometimes break a CPA-secure system.[2] For example, the El Gamal cipher is secure against chosen plaintext attacks, but vulnerable to chosen ciphertext attacks because it is unconditionally malleable. See also
References1. ^Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. The first edition (2001): http://www.cl.cam.ac.uk/~rja14/book.html {{DEFAULTSORT:Chosen-Plaintext Attack}}2. ^1 2 {{cite book|last1=Katz|first1=Jonathan|last2=Lindell|first2=Yehuda|title=Introduction to Modern Cryptography: Principles and Protocols|date=2007|publisher=Chapman and Hall/CRC|url=https://www.amazon.com/Introduction-Modern-Cryptography-Principles-Protocols/dp/1584885513|location=Boca Raton|authorlink=Jonathan Katz (computer scientist)|oclc=893721520}} 3. ^{{cite web |url=http://www.navy.mil/midway/how.html |title=How Cryptology enabled the United States to turn the tide in the Pacific War. |last1=Weadon |first1=Patrick D. |date= |website=www.navy.mil |publisher=US Navy |access-date=2015-02-19}} 4. ^{{Citation | last = Morris | first = Christopher | year = 1993 | contribution = Navy Ultra's Poor Relations | editor-last = Hinsley | editor-first = F.H. | editor-link = Harry Hinsley | editor2-last = Stripp | editor2-first = Alan | title = Codebreakers: The inside story of Bletchley Park | publication-place = Oxford | publisher = Oxford University Press | isbn = 978-0-19-280132-6 | page=235}} 5. ^{{cite news|last=Kelly|first=Jon|title=The piece of paper that fooled Hitler|url=https://www.bbc.co.uk/news/magazine-12266109|publisher=BBC|accessdate=1 January 2012|quote=The Nazis believed Pujol, whom they code named Alaric Arabel, was one of their prize assets|date=27 January 2011}} 6. ^Seaman (2004). "The first code which Garbo was given by the Germans for his wireless communications turned out to be the identical code which was currently in use in the German circuits" 1 : Chosen-plaintext attacks |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。