Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • 105 Accesses

A codebook attack is an example of a known plaintext attack scenario in which the attacker is given access to a set of plaintexts and their corresponding encryptions (for a fixed key): \((P_i,C_i), i=1,\ldots, N\). These pairs constitute a codebook which someone could use to listen to further communication and which could help him to partially decrypt the future messages even without the knowledge of the secret key. He could also use this knowledge in a replay attack by replacing blocks in the communication or by constructing meaningful messages from the blocks of the codebook. Codebook attack may even be applied in a passive traffic analysis scenario, i.e., as a ciphertext-only attack, which would start with frequency analysis of the received blocks and attempts to guess their meaning. Ciphers with small block size are vulnerable to the Codebook attack, especially if used in the simplest Electronic Codebook mode of operation. Already with \(N=2^{n/2}\) known pairs, where nis the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Biryukov, A. (2005). Codebook Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_67

Download citation

Publish with us

Policies and ethics