Difference between revisions 7756871 and 8267046 on simplewiki

{{complex|date=December 2011}}
A '''chosen-ciphertext attack (CCA)''' is an [[attack model]] for [[cryptanalysis]] in which the cryptanalyst gathers information, at least in part, by choosing a [[ciphertext]] and obtaining its decryption under an unknown key.  

(contracted; show full)y to decrypt, is available to an attacker while the user is out to lunch.  This form of the attack was the first one commonly discussed: obviously, if the attacker has the ability to make adaptive chosen ciphertext queries, no encrypted message would be safe, at least until that ability is taken away.  This attack is sometimes called the "non-adaptive chosen ciphertext attack";<ref name="BDPR">[[Mihir Bellare]], [[Anand Desai]], [[David Pointcheval]], and [[Philip Rogaway]], [http
s://www.springerlink.com/content/xl9cf8qpg0trrl9f/esolveit.blogspot.com/2022/06/relations-among-notions-of-security.html Relations among Notions of Security for Public-Key Encryption Schemes]{{Dead link|date=January 2021  |bot=InternetArchiveBot  |fix-attempted=yes  }}, in Advances in Cryptology – CRYPTO '98,  Santa Barbara, California, pp. 549–570.</ref> here, "non-adaptive" refers to the fact that the attacker cannot adapt their queries in response to the challenge, which is given after the ability to make chosen ciphertext queries has expired.  

(contracted; show full)* [[Ciphertext-only attack]]
* [[Chosen-plaintext attack]]
* [[Known-plaintext attack]]

==References==
{{reflist}}

[[Category:Cryptography]]