One-way hashing method for protection against an adaptive chosen ciphertext attack using Cramer-Shoup Algorithm
Keywords:
Chosen Ciphertext Attack (CCA2), Plaintext, Ciphertext, Cramer-Shoup, RSA, cryptography etc…Abstract
During the ciphertext attack, a cryptanalyst can separate any picked ciphertexts alongside their contrasting plaintexts. He will most likely acquire a secretive key or to get anyhow numerous information about the attacked system as could be anticipated considering this situation.
The attacker has the ability to make the individual being referred to (who obviously knows the secretive key) unscramble any ciphertext and send him back the result. By exploring the picked ciphertext and the looking at got plaintext, the intruder endeavors to calculate the baffling key which has been used by the individual been forwarded to. With public-key encryption, Chosen-ciphertext attacks are done by and large used for breaking structures. As an example, early types of the RSA figure were feeble against such attacks. They are utilized less habitually for attacking systems guaranteed by symmetric codes. Some self-synchronizing stream figures have been also attacked viably as such. The adaptable picked ciphertext attack is a type of picked ciphertext attacks, during which an assailant can make the attacked system unscramble different ciphertexts. This infers that the new ciphertexts is made ward on responses (plaintexts) got as of now. The attacker can request deciphering of various ciphertexts. There exist rather scarcely any practical flexible picked ciphertext attacks. This model consists of some degree used for inspecting the security of a given system. Showing that there attack doesn't break the security confirms that any pragmatic picked ciphertext attack will not succeed.
An Adaptive Chosen Ciphertext Attack (CCA2) is a security loophole wherein a foe with prophet admittance to a decoding capacity endeavour to overcome the security of the encryption plan to which that capacity takes place. Fundamentally, the foe might pick polynomials numerous subjective ciphertexts, and get the plaintexts to which those ciphertexts unscramble under a particular key. Since the fee is versatile, it might keep accessing this prophet even subsequent to testing the game and getting a reaction. The cramer-Shoup structure is an astray key based encryption computation, and we can endeavour guarantee against ciphertext attack to be safe against adaptable picked ciphertext attack using standard cryptographic doubts