Skip to main content

Adaptive Chosen Plaintext and Chosen Ciphertext Attack

  • Reference work entry
  • 137 Accesses

In this attack the scenario allows the attacker to apply adaptive chosen plaintext and adaptive chosen ciphertext queries simultaneously. The attack is one of the most powerful in terms of the capabilities of the attacker. The only two examples of such attacks known to date are the boomerang attack [2] and the yoyo-game [1].

This is a preview of subscription content, log in via an institution.

References

  1. Biham, E., A. Biryukov, O. Dunkelman, E. Richardson, and A. Shamir (1999). “Initial observations on Skipjack: Cryptanalysis of Skipjack-3xor.” Selected Areas in Cryptography, SAC 1998, Lecture Notes in Computer Science, vol. 1556, eds. S.E. Tavares and H. Meijer. Springer-Verlag, Berlin, 362–376.

    Google Scholar 

  2. Wagner, D. (1999). “The boomerang attack.” Fast Software Encryption, FSE'99, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 156–170.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Biryukov, A. (2005). Adaptive Chosen Plaintext and Chosen Ciphertext Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_7

Download citation

Publish with us

Policies and ethics