Varieties of Chosen-ciphertext Attacks
Chosen-ciphertext attacks, like other attacks, may be adaptive or non-adaptive. In a non-adaptive attack, the attacker chooses the ciphertext or ciphertexts to decrypt in advance, and does not use the resulting plaintexts to inform their choice for more ciphertexts. In an adaptive chosen-ciphertext attack, the attacker makes their ciphertext choices adaptively, that is, depending on the result of prior decryptions.
Read more about this topic: Chosen-ciphertext Attack
Famous quotes containing the words varieties of, varieties and/or attacks:
“Now there are varieties of gifts, but the same Spirit; and there are varieties of services, but the same Lord; and there are varieties of activities, but it is the same God who activates all of them in everyone.”
—Bible: New Testament, 1 Corinthians 12:4-6.
“Now there are varieties of gifts, but the same Spirit; and there are varieties of services, but the same Lord; and there are varieties of activities, but it is the same God who activates all of them in everyone.”
—Bible: New Testament, 1 Corinthians 12:4-6.
“The rebel, unlike the revolutionary, does not attempt to undermine the social order as a whole. The rebel attacks the tyrant; the revolutionary attacks tyranny. I grant that there are rebels who regard all governments as tyrannical; nonetheless, it is abuses that they condemn, not power itself. Revolutionaries, on the other hand, are convinced that the evil does not lie in the excesses of the constituted order but in order itself. The difference, it seems to me, is considerable.”
—Octavio Paz (b. 1914)