Crypto-IT Logo
ου γαρ εστιν κρυπτον ο ου φανερον γενησεται ουδε αποκρυφον ο ου γνωσθησεται και εις φανερον ελθη
Wersja PL ENG Version

Attack Models for Cryptanalysis

Attacking a cipher or a cryptographic system may lead to breaking it fully or only partially. After compromising the security, the attacker may obtain various amounts and kinds of information.

Lars Knudsen, a Danish researcher, proposed the following division for determining the scale of attacker's success:

The best ciphers should protect against all the cipher's failures levels mentioned above. No attack should be able to reveal any information related to the secret key and plaintext messages.

Types of cryptographic attacks

The following main types of theoretical attack models can be defined:

  1. Known-plaintext attack
  2. Chosen-plaintext attack
  3. Ciphertext-only (known ciphertext) attack
  4. Chosen-ciphertext attack
  5. Chosen-key attack

Within the groups defined above, the following attacks can be highlighted:

  1. Brute force attack
  2. DoS
  3. Man-in-the-middle attack
  4. Attack on Two-Time Pad
  5. KRACK attack
  6. Frequency analysis
  7. Meet-in-the-middle attack
  8. Replay attack
  9. Homograph attack

It seems to be worth mentioning that there are two more effective methods of breaking ciphers. A purchase-key attack involves using bribery for obtaining secret keys or other protected information. Whereas, in the so-called rubber-hose method blackmail, threats, and torture are the means used for obtaining the desirable secret information.