What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.
rn”,”seo_description”:”What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.”,”enabled”:1},”words_count”:540,”description”:”A known-plaintext attack exploits known pairs of plaintext and corresponding ciphertext to deduce encryption keys or methods.”,”author”:{“id”:1415,”title”:”Jagjit Singh”,”url”:”jagjit-singh”,”twitter”:””,”google_plus”:””,”photo”:””,”gender”:”male”,”description”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”facebook”:””,”email”:””,”linkedin”:””,”created_at”:”2021-11-03 12:47:28″,”updated_at”:”2022-06-02 09:53:58″,”deleted_at”:null,”innovation_circle_url”:null,”avatar”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2phZ2ppdC1zaW5naA==”,”relativeUrl”:”https://cointelegraph.com/authors/jagjit-singh”,”user_id”:1415,”language_id”:1,”name”:”Jagjit Singh”,”desc”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”seo_title”:””,”seo_description”:””,”enabled”:1,”show_in_authors”:0,”show_in_experts”:0},”category_id”:65,”audio”:”https://s3.cointelegraph.com/audio/115288.3c01386b-84d9-411c-847f-bdf05094756d.mp3″,”tags”:[{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”},{“name”:”Hackers”,”uri”:”/tags/hackers”,”super”:0,”page_title”:”Hackers News”},{“name”:”Encryption”,”uri”:”/tags/encryption”,”super”:0,”page_title”:”Encryption News”},{“name”:”Scams”,”uri”:”/tags/scams”,”super”:0,”page_title”:”Scams News”}],”tag_title”:”Blockchain”,”date”:”2 HOURS AGO”,”badge”:{“title”:”Explained”,”label”:”default”},”qty”:16,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=115288®ionId=1″,”shares”:3,”infographic”:false,”sponsored”:false,”explained”:true,”press_release”:false,”show_referral”:false,”social_description”:”The Known-Plaintext Attack operates on a principle similar to solving a jigsaw puzzle with a reference image. By discerning patterns between plaintext and ciphertext, hackers can unveil encryption blueprints. “,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”:115288,”post_url”:”https://cointelegraph.com/explained/known-plaintext-attacks-explained”,”post_titles”:{“normal”:”Known-plaintext attacks, explained”,”twitter”:”Known-plaintext attacks, explained”},”post_text”:{“normal”:”Known-plaintext attacks, explained”,”twitter”:”Known-plaintext attacks, explained https://cointelegraph.com/explained/known-plaintext-attacks-explained via @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained”,”count”:null,”short”:”fb”,”fa”:”facebook”},”twitter”:{“url”:”https://twitter.com/intent/tweet?text=Known-plaintext+attacks%2C+explained https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained via @cointelegraph”,”count”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained &text=Known-plaintext+attacks%2C+explained”,”count”:null,”short”:”tg”,”fa”:”paper-plane”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=Known-plaintext+attacks%2C+explained&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained”,”count”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained”,”count”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/submit?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained&title=Known-plaintext+attacks%2C+explained”,”count”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fknown-plaintext-attacks-explained&title=Known-plaintext+attacks%2C+explained”,”count”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:false,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=528/https://s3.cointelegraph.com/storage/uploads/view/ab03a2a2ce9a21dc1f0961d91731c8ba.png”,”elogo_x1″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=260/https://s3.cointelegraph.com/storage/uploads/view/ab03a2a2ce9a21dc1f0961d91731c8ba.png”,”elogo_svg”:false,”content”:[{“id”:4313,”post_id”:115288,”title”:”Understanding a known-plaintext attack”,”content”:”
A known-plaintext attack (KPA) is when a hacker uses well-known pairs of unencrypted and encrypted material to determine the algorithm or encryption key.
nn
In a known-plaintext attack, the attacker has access to both the data’s encrypted form (ciphertext) and its corresponding plaintext copy of the data’s original (unencrypted form). The attacker attempts to determine the encryption key or algorithm by examining the relationship between the plaintext and ciphertext.
nn
For instance, if “CRYPTO” is encoded as “XUZZA,” knowing this pair could enable the attacker to decode other parts of the message that are also encrypted with the same substitution key. This demonstrates how, with some encryption algorithms, even a tiny amount of knowledge can result in broader decryption.
nn
This kind of attack uses a flaw in encryption techniques that make it possible to identify patterns or connections produced between the plaintext and the ciphertext. If not correctly prevented, known-plaintext attacks can jeopardize the security of encryption systems.
nn
nn
Two common methods to exploit plaintext and its corresponding encrypted form to uncover encryption keys include frequency analysis and pattern matching. The frequency analysis method uses straightforward encryption methods with one-to-one letter or symbol substitutions. Attackers can figure out the key or unlock the rest of the communication by comparing the frequency of occurrence of particular letters or patterns in the known plaintext and the associated ciphertext.
nn
Attackers can spot trends when the same plaintext produces the same ciphertext in the pattern-matching method. They can recognize the encryption algorithm and decrypt the entire message by identifying patterns in the encrypted text and comparing them to known patterns in the plaintext.
nn
Related: What is a phishing attack in crypto, and how to prevent it?
nnnn”,”created_at”:”2023-08-24 17:38:12″,”updated_at”:”2023-08-24 17:40:56″,”sort”:1,”translations”:{“id”:4306,”explained_post_id”:4313,”title_en”:”Understanding a known-plaintext attack”,”content_en”:”
A known-plaintext attack (KPA) is when a hacker uses well-known pairs of unencrypted and encrypted material to determine the algorithm or encryption key.
nn
In a known-plaintext attack, the attacker has access to both the data’s encrypted form (ciphertext) and its corresponding plaintext copy of the data’s original (unencrypted form). The attacker attempts to determine the encryption key or algorithm by examining the relationship between the plaintext and ciphertext.
nn
For instance, if “CRYPTO” is encoded as “XUZZA,” knowing this pair could enable the attacker to decode other parts of the message that are also encrypted with the same substitution key. This demonstrates how, with some encryption algorithms, even a tiny amount of knowledge can result in broader decryption.
nn
This kind of attack uses a flaw in encryption techniques that make it possible to identify patterns or connections produced between the plaintext and the ciphertext. If not correctly prevented, known-plaintext attacks can jeopardize the security of encryption systems.
nn
nn
Two common methods to exploit plaintext and its corresponding encrypted form to uncover encryption keys include frequency analysis and pattern matching. The frequency analysis method uses straightforward encryption methods with one-to-one letter or symbol substitutions. Attackers can figure out the key or unlock the rest of the communication by comparing the frequency of occurrence of particular letters or patterns in the known plaintext and the associated ciphertext.
nn
Attackers can spot trends when the same plaintext produces the same ciphertext in the pattern-matching method. They can recognize the encryption algorithm and decrypt the entire message by identifying patterns in the encrypted text and comparing them to known patterns in the plaintext.
nn
Related: What is a phishing attack in crypto, and how to prevent it?
nnnn”,”title_es”:””,”content_es”:”nn”,”title_cn”:””,”content_cn”:”nn”,”title_de”:””,”content_de”:”nn”,”title_fr”:””,”content_fr”:”nn”,”title_it”:””,”content_it”:”nn”,”title_ar”:””,”content_ar”:”nn”,”title_br”:””,”content_br”:”nn”,”title_jp”:””,”content_jp”:”nn”,”created_at”:”2023-08-24 17:38:12″,”updated_at”:”2023-08-24 17:40:56″,”title_kr”:””,”content_kr”:”nn”,”title_tr”:””,”content_tr”:”nn”}},{“id”:4314,”post_id”:115288,”title”:”How does a known-plaintext attack work?”,”content”:”
In a KPA, the attacker can learn vital details about the encryption method by analyzing how particular chunks of the plaintext are converted into ciphertext using the same encryption key or algorithm.
nn
The attack involves the following steps:
nn
Collecting known pairs
nn
The attacker accumulates pairs of the original plaintext and the associated encrypted ciphertext acquired through various techniques, such as intercepted communications or data leaks.
nn
Analyzing patterns
nn
When the plaintext is encrypted to create the ciphertext, the attacker compares the patterns, modifications and transformations that take place. To understand the operation of the encryption process, they search for regular relationships between the known plaintext and ciphertext.
nn
Deriving a key or algorithm
nn
The attacker tries to determine crucial encryption elements, such as the encryption key, algorithm or other process parameters, based on the patterns they have noticed. They can independently replicate the encryption process thanks to this deduction.
nn
Decrypting other data
nn
The attacker can decrypt other encrypted material that employs the same encryption algorithm by using the deduced key or algorithm. This procedure may leak confidential information or jeopardize the encryption system’s security.
nnnn”,”created_at”:”2023-08-24 17:38:34″,”updated_at”:”2023-08-24 17:40:56″,”sort”:2,”translations”:{“id”:4307,”explained_post_id”:4314,”title_en”:”How does a known-plaintext attack work?”,”content_en”:”
In a KPA, the attacker can learn vital details about the encryption method by analyzing how particular chunks of the plaintext are converted into ciphertext using the same encryption key or algorithm.
nn
The attack involves the following steps:
nn
Collecting known pairs
nn
The attacker accumulates pairs of the original plaintext and the associated encrypted ciphertext acquired through various techniques, such as intercepted communications or data leaks.
nn
Analyzing patterns
nn
When the plaintext is encrypted to create the ciphertext, the attacker compares the patterns, modifications and transformations that take place. To understand the operation of the encryption process, they search for regular relationships between the known plaintext and ciphertext.
nn
Deriving a key or algorithm
nn
The attacker tries to determine crucial encryption elements, such as the encryption key, algorithm or other process parameters, based on the patterns they have noticed. They can independently replicate the encryption process thanks to this deduction.
nn
Decrypting other data
nn
The attacker can decrypt other encrypted material that employs the same encryption algorithm by using the deduced key or algorithm. This procedure may leak confidential information or jeopardize the encryption system’s security.
nnnn”,”title_es”:””,”content_es”:”nn”,”title_cn”:””,”content_cn”:”nn”,”title_de”:””,”content_de”:”nn”,”title_fr”:””,”content_fr”:”nn”,”title_it”:””,”content_it”:”nn”,”title_ar”:””,”content_ar”:”nn”,”title_br”:””,”content_br”:”nn”,”title_jp”:””,”content_jp”:”nn”,”created_at”:”2023-08-24 17:38:34″,”updated_at”:”2023-08-24 17:40:56″,”title_kr”:””,”content_kr”:”nn”,”title_tr”:””,”content_tr”:”nn”}},{“id”:4315,”post_id”:115288,”title”:”Chosen-plaintext attacks vs. known-plaintext attacks”,”content”:”
Chosen-plaintext attacks involve adversaries selecting plaintext and analyzing the corresponding ciphertext, whereas known-plaintext attacks occur when attackers possess partial knowledge of the plaintext.
nn
Understanding the differences between these two cryptographic attacks is vital for effective cryptographic defense strategies.
nn
nn
Frequency analysis concentrates on examining the occurrence of letters or symbols to determine encryption algorithms, unlike classic cryptanalysis, which examines ciphertext for patterns and flaws.
nn
Related: What is a crypto dusting attack, and how do you avoid it?
nn
nnn”,”created_at”:”2023-08-24 17:39:21″,”updated_at”:”2023-08-24 17:40:56″,”sort”:3,”translations”:{“id”:4308,”explained_post_id”:4315,”title_en”:”Chosen-plaintext attacks vs. known-plaintext attacks”,”content_en”:”
Chosen-plaintext attacks involve adversaries selecting plaintext and analyzing the corresponding ciphertext, whereas known-plaintext attacks occur when attackers possess partial knowledge of the plaintext.
nn
Understanding the differences between these two cryptographic attacks is vital for effective cryptographic defense strategies.
nn
nn
Frequency analysis concentrates on examining the occurrence of letters or symbols to determine encryption algorithms, unlike classic cryptanalysis, which examines ciphertext for patterns and flaws.
nn
Related: What is a crypto dusting attack, and how do you avoid it?
nn
nnn”,”title_es”:””,”content_es”:”nn”,”title_cn”:””,”content_cn”:”nn”,”title_de”:””,”content_de”:”nn”,”title_fr”:””,”content_fr”:”nn”,”title_it”:””,”content_it”:”nn”,”title_ar”:””,”content_ar”:”nn”,”title_br”:””,”content_br”:”nn”,”title_jp”:””,”content_jp”:”nn”,”created_at”:”2023-08-24 17:39:21″,”updated_at”:”2023-08-24 17:40:56″,”title_kr”:””,”content_kr”:”nn”,”title_tr”:””,”content_tr”:”nn”}},{“id”:4316,”post_id”:115288,”title”:”How to protect against a known-plaintext attack?”,”content”:”
To safeguard against known-plaintext attacks, adopt strong encryption algorithms, manage encryption keys securely, use unique keys per session, and add randomness to encryption processes to enhance protection against attacks.
nn
Choose encryption algorithms that can withstand known-plaintext attacks by using strong encryption techniques. By preventing patterns in the plaintext from correlating with patterns in the ciphertext, modern cryptographic algorithms like the Advanced Encryption Standard (AES) are made to survive such attacks. AES is a widely used symmetric encryption algorithm known for its security and efficiency.
nn
nn
Securely manage encryption keys to avoid unauthorized access. Use secure key repositories, rotate your keys frequently and use strong key generation techniques. Additionally, avoid encrypting discrete, predictable chunks of data. To stop an attacker from using known pairs, encrypt the entire message or file.
nn
Moreover, use various keys for various sessions and endeavors. The impact of a known-plaintext attack is reduced because each session will use a different encryption key. Also, maintain the most recent versions of your systems, libraries and encryption software. Security fixes that repair vulnerabilities are frequently included in updates.
nn
Before encrypting the plaintext of the data, add a cryptographic salt — a random value — to it. This makes each encryption unique, even when encrypting the same plaintext multiple times. In addition, avoid encryption methods that are known to be vulnerable to known-plaintext attacks. That said, perform proper due diligence when selecting encryption algorithms.
nnnn”,”created_at”:”2023-08-24 17:39:55″,”updated_at”:”2023-08-24 17:40:56″,”sort”:4,”translations”:{“id”:4309,”explained_post_id”:4316,”title_en”:”How to protect against a known-plaintext attack?”,”content_en”:”
To safeguard against known-plaintext attacks, adopt strong encryption algorithms, manage encryption keys securely, use unique keys per session, and add randomness to encryption processes to enhance protection against attacks.
nn
Choose encryption algorithms that can withstand known-plaintext attacks by using strong encryption techniques. By preventing patterns in the plaintext from correlating with patterns in the ciphertext, modern cryptographic algorithms like the Advanced Encryption Standard (AES) are made to survive such attacks. AES is a widely used symmetric encryption algorithm known for its security and efficiency.
nn
nn
Securely manage encryption keys to avoid unauthorized access. Use secure key repositories, rotate your keys frequently and use strong key generation techniques. Additionally, avoid encrypting discrete, predictable chunks of data. To stop an attacker from using known pairs, encrypt the entire message or file.
nn
Moreover, use various keys for various sessions and endeavors. The impact of a known-plaintext attack is reduced because each session will use a different encryption key. Also, maintain the most recent versions of your systems, libraries and encryption software. Security fixes that repair vulnerabilities are frequently included in updates.
nn
Before encrypting the plaintext of the data, add a cryptographic salt — a random value — to it. This makes each encryption unique, even when encrypting the same plaintext multiple times. In addition, avoid encryption methods that are known to be vulnerable to known-plaintext attacks. That said, perform proper due diligence when selecting encryption algorithms.
nnnn”,”title_es”:””,”content_es”:”nn”,”title_cn”:””,”content_cn”:”nn”,”title_de”:””,”content_de”:”nn”,”title_fr”:””,”content_fr”:”nn”,”title_it”:””,”content_it”:”nn”,”title_ar”:””,”content_ar”:”nn”,”title_br”:””,”content_br”:”nn”,”title_jp”:””,”content_jp”:”nn”,”created_at”:”2023-08-24 17:39:55″,”updated_at”:”2023-08-24 17:40:56″,”title_kr”:””,”content_kr”:”nn”,”title_tr”:””,”content_tr”:”nn”}}],”is_partner_material”:false,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/known-plaintext-attacks-explained”,”list”:[],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Comment”,”amountPostfix”:”Comments”,”cancel”:”Cancel”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Comment text cannot be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Comment text must be at least 2 characters long”,”hideButton”:”Hide comments”,”noComments”:” “,”commentOnModeration”:”Comment on moderation”,”postComment”:”Post”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Sign in”,”update”:”Update comment”,”commentWasDeleted”:”This comment has been deleted”}},”related”:[{“id”:109270,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/storage/uploads/view/7969703ec7d9ed20e9cd2f0e901d34e6.jpg”,”url”:”https://cointelegraph.com/explained/what-are-nft-royalties-and-how-do-they-work”,”title”:”What are NFT royalties, and how do they work?”,”lead”:”NFT royalties refer to the percentage of sales or transactions of a nonfungible token (NFT) that are paid to the original creator or owner of the NFT. “,”leadfull”:””,”category_id”:65,”category_url”:”https://cointelegraph.com/explained”,”category_title”:”Explained”,”author_url”:”https://cointelegraph.com/authors/arunkumar-krishnakumar”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2FydW5rdW1hci1rcmlzaG5ha3VtYXI=”,”author_title”:”Arunkumar Krishnakumar”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/9eb8857e029ccc4cb084a3acb28859e1.jpg”,”date”:”MAY 28, 2023″,”flash_date”:”MAY 28, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:true,”badge”:{“title”:”Explained”,”label”:”default”},”published”:{“date”:”2023-05-28 15:15:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:982,”rss_date”:”Sun, 28 May 2023 15:15:00 +0100″,”publishedW3″:”2023-05-28T15:15:00+01:00″,”show_referral”:false,”isMagazine”:false},{“id”:113938,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/bfbec56a-0a87-4c98-a062-958730d51511.jpg”,”url”:”https://cointelegraph.com/news/curve-emergency-dao-terminates-rewards-for-hack-related-pools”,”title”:”Curve emergency DAO terminates rewards for hack-related pools”,”lead”:”The Curve emergency DAO removed CRV rewards for alETH, msETH, pETH, crvCRVETH, Arbitrum Tricrypto and multiBTC pools.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/tom-blackstone”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3RvbS1ibGFja3N0b25l”,”author_title”:”Tom Blackstone”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/fcc228ab484f6733d5208bb3df2e94e7.jpg”,”date”:”AUG 02, 2023″,”flash_date”:”AUG 02, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2023-08-02 22:19:36.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3249,”rss_date”:”Wed, 02 Aug 2023 22:19:36 +0100″,”publishedW3″:”2023-08-02T22:19:36+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:114302,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/7d0f71b3-f207-401a-9cab-f7d82f7fa898.jpg”,”url”:”https://cointelegraph.com/news/blockchain-capital-x-twitter-hacked-promoting-token-claim-scam”,”title”:”Blockchain Capital’s X account hacked to promote token claim scam”,”lead”:”The account made multiple posts promising a token giveaway and ushered users to a copycat website to connect their crypto wallet.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/brayden-lindrea”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2JyYXlkZW4tbGluZHJlYQ==”,”author_title”:”Brayden Lindrea”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/833595a19b7b66483f6e9fd16e2aaafa.jpg”,”date”:”AUG 09, 2023″,”flash_date”:”AUG 09, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2023-08-09 03:07:17.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3057,”rss_date”:”Wed, 09 Aug 2023 03:07:17 +0100″,”publishedW3″:”2023-08-09T03:07:17+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:114748,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/d863d96e-515d-4651-aa09-60603e7f9025.jpg”,”url”:”https://cointelegraph.com/news/certik-drops-findings-on-alleged-scammer-who-stole-1m-in-crypto”,”title”:”CertiK drops findings on alleged scammer who stole $1M in crypto”,”lead”:”The cybersecurity firm did not release the actual names or identities of the hackers but claims it will pass the information on to the relevant authorities. “,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/ezra-reguerra”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2V6cmEtcmVndWVycmE=”,”author_title”:”Ezra Reguerra”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/b3f196ca08db938d691ee77699aaf4ff.jpg”,”date”:”AUG 16, 2023″,”flash_date”:”AUG 16, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2023-08-16 10:56:11.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:18484,”rss_date”:”Wed, 16 Aug 2023 10:56:11 +0100″,”publishedW3″:”2023-08-16T10:56:11+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:115094,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/4825c651-7b83-4923-abdd-04fe980d37b0.jpg”,”url”:”https://cointelegraph.com/news/crypto-p2p-scams-india”,”title”:”Crypto P2P scams in India show digital asset education is needed “,”lead”:”Scammers have made it impossible for Indian crypto traders to conduct P2P trades owing to several police complaints and bank account freezes that follow. “,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/prashant-jha”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3ByYXNoYW50LWpoYQ==”,”author_title”:”Prashant Jha”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/bf988968afe0f8e88a217e2a20c5fc1e.jpg”,”date”:”AUG 22, 2023″,”flash_date”:”AUG 22, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”In depth”,”label”:”success”},”published”:{“date”:”2023-08-22 14:01:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1638,”rss_date”:”Tue, 22 Aug 2023 14:01:00 +0100″,”publishedW3″:”2023-08-22T14:01:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:115170,”retina”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1480/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=740/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”thumb370″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=370/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”amp_thumb”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”thumb150″:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=150/https://s3.cointelegraph.com/uploads/2023-08/d5544d34-251f-4c83-9c15-11ada253ced2.jpg”,”url”:”https://cointelegraph.com/news/how-vanity-addresses-work”,”title”:”How to put words into a Bitcoin address? Here’s how vanity addresses work”,”lead”:”A Bitcoin vanity address is your signature on the blockchain canvas — a custom touch in the realm of digital finance.”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/helen-partz”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2hlbGVuLXBhcnR6″,”author_title”:”Helen Partz”,”author_img”:”https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=32/https://s3.cointelegraph.com/storage/uploads/view/04a25228c6ee7dcd9af6997bf9906ba7.jpg”,”date”:”AUG 23, 2023″,”flash_date”:”AUG 23, 2023″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”How to”,”label”:”default”},”published”:{“date”:”2023-08-23 10:52:49.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1281,”rss_date”:”Wed, 23 Aug 2023 10:52:49 +0100″,”publishedW3″:”2023-08-23T10:52:49+01:00″,”show_referral”:true,”isMagazine”:false}]}” :shares=”{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=%URL%”,”icon”:”facebook”,”title”:”Facebook”,”sizesAllowed”:[{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"position":1,"status":true},"twitter":{"url":"https://twitter.com/intent/tweet?text=%TEXT%","icon":"twitter","title":"Twitter","position":2,"status":true,"sizesAllowed":[{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&text=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”position”:3,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”position”:5,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”copy”:{“url”:”%URL%”,”icon”:”copy”,”position”:7,”title”:”Copy Link”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”status”:true},”whatsapp”:{“url”:”https://wa.me/?text=%TITLE% %URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:6,”status”:true},”reddit”:{“url”:”https://www.reddit.com/submit?url=%URL%&title=%TITLE%”,”icon”:”reddit”,”title”:”Reddit”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:4,”status”:true}}” is=”ExplainedPostPage”>
A known-plaintext attack (KPA) is when a hacker uses well-known pairs of unencrypted and encrypted material to determine the algorithm or encryption key.
In a known-plaintext attack, the attacker has access to both the data’s encrypted form (ciphertext) and its corresponding plaintext copy of the data’s original (unencrypted form). The attacker attempts to determine the encryption key or algorithm by examining the relationship between the plaintext and ciphertext.
For instance, if “CRYPTO” is encoded as “XUZZA,” knowing this pair could enable the attacker to decode other parts of the message that are also encrypted with the same substitution key. This demonstrates how, with some encryption algorithms, even a tiny amount of knowledge can result in broader decryption.
This kind of attack uses a flaw in encryption techniques that make it possible to identify patterns or connections produced between the plaintext and the ciphertext. If not correctly prevented, known-plaintext attacks can jeopardize the security of encryption systems.
Two common methods to exploit plaintext and its corresponding encrypted form to uncover encryption keys include frequency analysis and pattern matching. The frequency analysis method uses straightforward encryption methods with one-to-one letter or symbol substitutions. Attackers can figure out the key or unlock the rest of the communication by comparing the frequency of occurrence of particular letters or patterns in the known plaintext and the associated ciphertext.
Attackers can spot trends when the same plaintext produces the same ciphertext in the pattern-matching method. They can recognize the encryption algorithm and decrypt the entire message by identifying patterns in the encrypted text and comparing them to known patterns in the plaintext.
Related: What is a phishing attack in crypto, and how to prevent it?
In a KPA, the attacker can learn vital details about the encryption method by analyzing how particular chunks of the plaintext are converted into ciphertext using the same encryption key or algorithm.
The attack involves the following steps:
Collecting known pairs
The attacker accumulates pairs of the original plaintext and the associated encrypted ciphertext acquired through various techniques, such as intercepted communications or data leaks.
Analyzing patterns
When the plaintext is encrypted to create the ciphertext, the attacker compares the patterns, modifications and transformations that take place. To understand the operation of the encryption process, they search for regular relationships between the known plaintext and ciphertext.
Deriving a key or algorithm
The attacker tries to determine crucial encryption elements, such as the encryption key, algorithm or other process parameters, based on the patterns they have noticed. They can independently replicate the encryption process thanks to this deduction.
Decrypting other data
The attacker can decrypt other encrypted material that employs the same encryption algorithm by using the deduced key or algorithm. This procedure may leak confidential information or jeopardize the encryption system’s security.
Chosen-plaintext attacks involve adversaries selecting plaintext and analyzing the corresponding ciphertext, whereas known-plaintext attacks occur when attackers possess partial knowledge of the plaintext.
Understanding the differences between these two cryptographic attacks is vital for effective cryptographic defense strategies.
Frequency analysis concentrates on examining the occurrence of letters or symbols to determine encryption algorithms, unlike classic cryptanalysis, which examines ciphertext for patterns and flaws.
Related: What is a crypto dusting attack, and how do you avoid it?
To safeguard against known-plaintext attacks, adopt strong encryption algorithms, manage encryption keys securely, use unique keys per session, and add randomness to encryption processes to enhance protection against attacks.
Choose encryption algorithms that can withstand known-plaintext attacks by using strong encryption techniques. By preventing patterns in the plaintext from correlating with patterns in the ciphertext, modern cryptographic algorithms like the Advanced Encryption Standard (AES) are made to survive such attacks. AES is a widely used symmetric encryption algorithm known for its security and efficiency.
Securely manage encryption keys to avoid unauthorized access. Use secure key repositories, rotate your keys frequently and use strong key generation techniques. Additionally, avoid encrypting discrete, predictable chunks of data. To stop an attacker from using known pairs, encrypt the entire message or file.
Moreover, use various keys for various sessions and endeavors. The impact of a known-plaintext attack is reduced because each session will use a different encryption key. Also, maintain the most recent versions of your systems, libraries and encryption software. Security fixes that repair vulnerabilities are frequently included in updates.
Before encrypting the plaintext of the data, add a cryptographic salt — a random value — to it. This makes each encryption unique, even when encrypting the same plaintext multiple times. In addition, avoid encryption methods that are known to be vulnerable to known-plaintext attacks. That said, perform proper due diligence when selecting encryption algorithms.