2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet256/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   252   253   254   255   256   257   258   259   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Chosen Plaintext
In a chosen plaintext attack, the attacker has the ability to encrypt 
plaintext messages of their choosing and can then analyze the ciphertext output of the 
encryption algorithm. 
Meet in the Middle
Attackers might use a meet-in-the-middle attack to defeat encryp-
tion algorithms that use two rounds of encryption. This attack is the reason that Double 
DES (2DES) was quickly discarded as a viable enhancement to the DES encryption (it was 
replaced by Triple DES, or 3DES). 
In the meet-in-the-middle attack, the attacker uses a known plaintext message. The 
plain text is then encrypted using every possible key (k1), and the equivalent ciphertext is 
decrypted using all possible keys (k2). When a match is found, the corresponding pair 
(k1, k2) represents both portions of the double encryption. This type of attack generally 
takes only double the time necessary to break a single round of encryption (or 2 
n
rather 
than the anticipated 2 
 
n
 
* 2 
 
n
 
), offering minimal added protection. 
Man in the Middle
In the man-in-the-middle attack, a malicious individual sits between 
two communicating parties and intercepts all communications (including the setup of the 
cryptographic session). The attacker responds to the originator’s initialization requests and 
sets up a secure session with the originator. The attacker then establishes a second secure 
session with the intended recipient using a different key and posing as the originator. The 
attacker can then “sit in the middle” of the communication and read all traffi c as it passes 
between the two parties. 
Be careful not to confuse the meet-in-the-middle attack with the man-
in-the-middle attack. They may have similar names, but they are quite 
different!

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   252   253   254   255   256   257   258   259   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish