Chosen-ciphertext attack: In a chosen-ciphertext attack, the attacker has access to a ciphertext (encrypted message) and is able to manipulate it in some way to try and derive the plaintext (original message). For example, the attacker may try to modify the ciphertext and see how the resulting decryption changes in order to learn more about the encryption algorithm and key being used.
Categories: CC D5: Security Operations | CCSP D2: Cloud Data Security | CISM D3: Information Security Program | CISSP D3: Security Architecture and Engineering | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D5: Cryptography
« Back to Glossary Index