Attacks on Cryptosystems
Get Ke, Kd, or P ‘outside’ of the ‘system’
- Cryptosystems like this are mathematical
- Implementations are physical
Cryptanalyze from:
- C: Ciphertext only attack
- Their P,C pairs: ‘Known plaintext’
- Your P,C pairs:‘Selected/Chosen plaintext’
Protocol attacks
- key distribution
- key maintenance
- user behavior
- system behavior