翻訳と辞書
Words near each other
・ Distretto di Polizia
・ Distinguished Service Medal, Gold
・ Distinguished Service Medal, Silver
・ Distinguished Service Order
・ Distinguished Service Order (Argentina)
・ Distinguished Service Order (disambiguation)
・ Distinguished Service Order (Vietnam)
・ Distinguished Service Star
・ Distinguished Service to Music Medal
・ Distinguished Unit Award
・ Distinguished visiting professor
・ Distinguished Warfare Medal
・ Distinguished Young Women
・ Distinguisher
・ Distinguishing
Distinguishing attack
・ Distinguishing coloring
・ Distinguo
・ Distino di Belita
・ Distinto
・ Distipsidera
・ Distler
・ Distocambarus
・ Distocercospora
・ Distocercospora livistonae
・ Distocupes
・ Distocyclus
・ Distocyclus conirostris
・ Distoechodon
・ Distoleon


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Distinguishing attack : ウィキペディア英語版
Distinguishing attack

In cryptography, a distinguishing attack is any form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish the encrypted data from random data. Modern symmetric-key ciphers are specifically designed to be immune to such an attack. In other words, modern encryption schemes are pseudorandom permutations and are designed to have ciphertext indistinguishability. If an algorithm is found that can distinguish the output from random faster than a brute force search, then that is considered a break of the cipher.
A similar concept is the known-key distinguishing attack, whereby an attacker knows the key and can find a structural property in cipher, where the transformation from plaintext to ciphertext is not random.
==Overview==

To prove that a cryptographic function is safe, it is often compared to a random oracle. If a function would be a random oracle, then an attacker is not able to predict any of the output of the function. If a function is distinguishable from a random oracle, it has non-random properties. That is, there exists a relation between different outputs, or between input and output, which can be used by an attacker for example to find (a part of) the input.
Example
Let T be a sequence of random bits, generated by a random oracle and S be a sequence generated by a pseudo-random bit generator. Two parties use one encryption system to encrypt a message M of length n as the bitwise XOR of M and the next n bits of T or S respectively. The output of the encryption using T is truly random. Now if the sequence S cannot be distinguished from T, the output of the encryption with S will appear random as well. If the sequence S is distinguishable, then the encryption of M with S may reveal information of M.
Two systems S and T are said to be indistinguishable if there exists no algorithm D, connected to either S or T, able to decide whether it is connected to S or T.
A distinguishing attack is given by such an algorithm D. It is broadly an attack in which the attacker is given a black box containing either an instance of the system under attack with an unknown key, or a random object in the domain that the system aims to emulate, then if the algorithm is able to tell whether the system or the random object is in the black box, one has an attack. For example, a distinguishing attack on a stream cipher such as RC4 might be one that determines whether a given stream of bytes is random or generated by RC4 with an unknown key.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Distinguishing attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.