In order to retrieve the plaintexts of information, attackers and cryptanalysts are using many techniques:
- Brute force attack (BFA): During this attack, the attacker will try all the key combinations to retrieve the key
- Dictionary attack: In this attack, the attacker uses prepared dictionaries and tries the words in them
- Birthday attack: In the birthday attack, the attacker uses hash collision
- Ciphertext only attack (COA): In this attack, the attacker possesses the ciphertexts, and he only needs to determine the key
- Known plaintext attack (KPA): The attacker uses what we call linear cryptanalysis to retrieve the missing plaintexts from ciphers, while he knows some partially plaintexts of the cipher
- Chosen plaintext attack (CPA): The attacker uses differential cryptanalysis to retrieve the key after choosing the ciphertext and plaintexts by themselves
- Side...