A cryptographic attack allows the attacker to bypass the security of a cryptographic system by assessing the weakness in its
There are many different attacks that the attacker uses to bypass the security of a system. Some of these attacks are as follows:
The attacks mentioned above help the attacker access the cryptographically encrypted communication channel. After gaining access, the attacker can choose to eavesdrop on the communication channel or eavesdrop and tamper with the messages. The cryptographic attacks can be classified into two categories based on their use case:
Active attacks occur when the attacker gets access to the communication channel between the two entities. The attacker acts as the man in the middle and can eavesdrop and tamper with the messages being sent on the channel between the entities. These attacks are relatively easy to detect but still are considered to be the more dangerous of the two, as the attacker can manipulate the data being shared and gain access or privileges.
Passive attacks occur when the user gets access to the communication channel between the two entities and can eavesdrop on the ongoing communication between the two entities. However, the attacker can't tamper with the messages in this case as was possible in the active attack. Passive attacks are harder to detect and cause little less damage than active attacks, but the confidentiality of the messages is lost.
Free Resources