Passive attack

A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known.

While most classical ciphers are vulnerable to this form of attack, most modern ciphers are designed to prevent this type of attack above all others.

Attributes

  • Traffic Analysis
  • Non-evasive eavesdropping and monitoring of transmissions
  • Because data unaffected, tricky to detect
  • Emphasis on prevention (encryption) not detection
  • Sometimes referred to as “tapping”

The main types of passive attacks are traffic analysis and release of message contents.

During a traffic analysis attack, the eavesdropper analyzes the traffic, determines the location, identifies communicating hosts and observes the frequency and length of exchanged messages. He uses all this information to predict the nature of communication. All incoming and outgoing traffic of the network is analyzed, but not altered.

For a release of message content, a telephonic conversation, an E-mail message or a transferred file may contain confidential data. A passive attack monitors the contents of the transmitted data.

Passive attacks are very difficult to detect because they do not involve any alteration of the data. When the messages are exchanged neither the sender nor the receiver is aware that a third party may capture the messages. This can be prevented by encryption of data.

Further reading

gollark: I mean, their Twitter feed is still active.
gollark: I don't understand what you're asking, but you can just look at the website here: https://www.kura.tech/
gollark: What?
gollark: "Kura Technologies" apparently managed some very impressive things with accursed physicsy optics, but I don't think they're widely available now or have had proper external reviews.
gollark: I'm mostly interested in AR, since a better interface for looking at internet things on the go than my phone would be very convenient.

See also

  • Known plaintext attack
  • Chosen plaintext attack
  • Chosen ciphertext attack
  • Adaptive chosen ciphertext attack
  • Topics in cryptography


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.