Skip to main content

Adaptive Chosen Plaintext and Chosen Ciphertext Attack

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 352 Accesses

Related Concepts

Block Ciphers; Boomerang Attack; Symmetric Cryptosystem

Definition

In this attack, the scenario allows the attacker to apply adaptive chosen plaintext and adaptive chosen ciphertext queries simultaneously. The attack is one of the most powerful in terms of the capabilities of the attacker. The only two examples of such attacks known to date are the boomerang attack [2] and the yoyo-game [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Biham E, Biryukov A, Dunkelman O, Richardson E, Shamir A (1999) Initial observations on skipjack: cryptanalysis of skipjack-3xor. In: Tavares SE, Meijer H (eds) Selected areas in cryptography, SAC 1998. Lecture notes in computer science, vol 1556. Springer, Berlin, pp 362–376

    Google Scholar 

  2. Wagner D (1999) The boomerang attack. In: Knudsen LR (ed) Fast software encryption, FSE’99. Lecture notes in computer science, vol 1636. Springer, Berlin, pp 156–170

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Biryukov, A. (2011). Adaptive Chosen Plaintext and Chosen Ciphertext Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_544

Download citation

Publish with us

Policies and ethics