2 cissp ® Official Study Guide Eighth Edition


Frequency Analysis and the Ciphertext Only Attack



Download 19,3 Mb.
Pdf ko'rish
bet255/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   251   252   253   254   255   256   257   258   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Frequency Analysis and the Ciphertext Only Attack
In many cases, the only information 
you have at your disposal is the encrypted ciphertext message, a scenario known as the 
ciphertext only attack
. In this case, one technique that proves helpful against simple ciphers 
is frequency analysis—counting the number of times each letter appears in the ciphertext. 
Using your knowledge that the letters 
E

T

A

O

I

N
are the most common in the English 
language, you can then test several hypotheses:

If these letters are also the most common in the ciphertext, the cipher was likely a 
transposition cipher, which rearranged the characters of the plain text without
altering them.

If other letters are the most common in the ciphertext, the cipher is probably some 
form of substitution cipher that replaced the plaintext characters.


Cryptographic Attacks 
267
This is a simple overview of frequency analysis, and many sophisticated variations 
on this technique can be used against polyalphabetic ciphers and other sophisticated 
cryptosystems. 
Known Plaintext
In the known plaintext attack, the attacker has a copy of the encrypted 
message along with the plaintext message used to generate the ciphertext (the copy). This 
knowledge greatly assists the attacker in breaking weaker codes. For example, imagine the 
ease with which you could break the Caesar cipher described in Chapter 6 if you had both 
a plaintext copy and a ciphertext copy of the same message. 
Chosen Ciphertext
In a chosen ciphertext attack, the attacker has the ability to decrypt 
chosen portions of the ciphertext message and use the decrypted portion of the message to 
discover the key. 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   251   252   253   254   255   256   257   258   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish