Description: This video is about different types of attacks on cryptography the attacker or crypto-analyst can do. The video starts with the basics of cryptography and how the encryption and decryption is performed. Cryptoanalysis is a synonym for codebreaking and refers to the practice of analyzing ciphertext with the intent of breaking it or "cracking the code". Cryptoanalysis is the study of ways that can be used to obtain plaintext information from encrypted information without using the intended method such as using a key to decrypt the information. Cryptoanalysis attempts to attack weaknesses in the methods used to encrypt code or the methods used to generate keys. There are several cryptoanalysis methods including:
Linear cryptoanalysis is a plaintext attack which uses linear approximation to determine the behavior of the block cipher. If enough plaintest and matching ciphertest are obtained, information about the key can eventually be discovered. It has been used successfully against FEAL and DES.
Differential cryptoanalysis is basically a plaintext attack using chosen plaintest and depends on an analysis of the differences between two related plaintexts as they are encrypted using the same key. By carefully analyzing the data the probability of possible keys being used to encrypt the data can be calculated and the correct key can be eventually identified.
<p> The video talks about the following attacks:
Cipher text only attack
Known plain text attack
Chosen plain text attack
Adaptive chosen plain text attack
Chosen cipher text attack
Chosen key attack
Bribery and other social engineering attack
As the name suggests, in Cipher text only attack, the cryptanalyst has access to only the cipher text, and he has to find the flaw in cryptographic algorithm or the way it is used to find the key. In similar ways the video explains about the different attacks.
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.