Passive attack

A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext).[1][2] This can also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known.

While active attackers can interact with the parties by sending data, a passive attacker is limited to intercepting communications (eavesdropping), and seeks to decrypt data by interpreting the transcripts of authentication sessions.[3][4] Since passive attackers do not introduce data of their own, they can be difficult to detect.[5]

While most classical ciphers are vulnerable to this form of attack, most modern ciphers are designed to prevent this type of attack above all others.

  1. ^ Cite error: The named reference geeks was invoked but never defined (see the help page).
  2. ^ Cite error: The named reference book1 was invoked but never defined (see the help page).
  3. ^ Cite error: The named reference nlhb was invoked but never defined (see the help page).
  4. ^ Cite error: The named reference manets was invoked but never defined (see the help page).
  5. ^ Cite error: The named reference meshnets was invoked but never defined (see the help page).

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search