Passive attack
From Wikipedia, the free encyclopedia
This article does not cite any references or sources. (December 2006) Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed. |
A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known.
While most classical ciphers are vulnerable to this form of attack, most modern ciphers are designed to prevent this type of attack above all others.
Contents |
[edit] Attributes
- Non-evasive eavesdropping and monitoring of transmissions
- Because data unaffected, tricky to detect
- Emphasis on prevention (encryption) not detection
- Sometimes referred to as “tapping”
[edit] Types
- Release of message contents – unauthorized party gaining access to confidential information
- Traffic Analysis – discovering and tracking patterns in message time, length, frequency and location of transmitting parties
[edit] Further reading
[edit] See also
- Chosen plaintext attack
- Chosen ciphertext attack
- Adaptive chosen ciphertext attack
- Topics in cryptography