An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of ciphertexts to be decrypted, then uses the results of these decryptions to select subsequent ciphertexts. It is to be distinguished from an indifferent chosen-ciphertext attack (CCA1).
The goal of this attack is to gradually reveal information about an encrypted message, or about the decryption key itself. For public-key systems, adaptive-chosen-ciphertexts are generally applicable only when they have the property of ciphertext malleability — that is, a ciphertext can be modified in specific ways that will have a predictable effect on the decryption of that message.
Read more about Adaptive Chosen-ciphertext Attack: Practical Attacks, Preventing Attacks, Mathematical Model
Famous quotes containing the words adaptive and/or attack:
“The shift from the perception of the child as innocent to the perception of the child as competent has greatly increased the demands on contemporary children for maturity, for participating in competitive sports, for early academic achievement, and for protecting themselves against adults who might do them harm. While children might be able to cope with any one of those demands taken singly, taken together they often exceed childrens adaptive capacity.”
—David Elkind (20th century)
“Philosophy can be compared to some powders that are so corrosive that, after they have eaten away the infected flesh of a wound, they then devour the living flesh, rot the bones, and penetrate to the very marrow. Philosophy at first refutes errors. But if it is not stopped at this point, it goes on to attack truths. And when it is left on its own, it goes so far that it no longer knows where it is and can find no stopping place.”
—Pierre Bayle (16471706)