Wired Equivalent Privacy (WEP), the first security protocol for Wi-Fi, proved vulnerable to several attacks, most of them ciphertext-only.
Massive Attack | Attack on Pearl Harbor | attack on Pearl Harbor | Star Wars Episode II: Attack of the Clones | attack | suicide attack | 2012 Benghazi attack | Joint Direct Attack Munition | Jack-Jack Attack | Attack Attack! | Suicide attack | Milltown Cemetery attack | Godzilla, Mothra and King Ghidorah: Giant Monsters All-Out Attack | Attack the Block | Attack on Sydney Harbour | Attack of the Show! | Attack of the Killer Tomatoes | 2007 Glasgow International Airport attack | Young Heart Attack | This Heart Attack | Standoff Land Attack Missile | Sarin gas attack on the Tokyo subway | Oktoberfest terror attack | Massive Attack's | Korean Attack Submarine program | Flying Saucer Attack | fast attack craft | Denial-of-service attack | Demon Attack | Counter-Attack |
Distinguishing attack, a cryptographic attack that distinguishes a ciphertext from truly random data
He is best known for his work with Victor Shoup on chosen ciphertext secure encryption in the standard model, in particular the Cramer–Shoup encryption scheme.
Unlike other security definitions, semantic security does not consider the case of chosen ciphertext attack (CCA), where an attacker is able to request the decryption of chosen ciphertexts, and many semantically secure encryption schemes are demonstrably insecure against chosen ciphertext attack.
In the case of RSA decryption with secret exponent and corresponding encryption exponent and modulus , the technique applies as follows (for simplicity, the modular reduction by m is omitted in the formulas): before decrypting; that is, before computing the result of for a given ciphertext , the system picks a random number and encrypts it with public exponent to obtain .