Breadcrumbs Section. Click here to navigate to respective pages.
Chapter

Chapter
CCA-Security and Authenticated Encryption
DOI link for CCA-Security and Authenticated Encryption
CCA-Security and Authenticated Encryption book
CCA-Security and Authenticated Encryption
DOI link for CCA-Security and Authenticated Encryption
CCA-Security and Authenticated Encryption book
ABSTRACT
This chapter describes the application of authenticated encryption to the setting of two parties who wish to communicate “securely”—namely, with joint secrecy and integrity—over the course of a communication session. Chosen-ciphertext attacks are possible, in principle, any time an attacker has the ability to inject traffic on the channel between the sender and receiver. This chapter describes in detail an attack of exactly this sort where an attacker is able to leverage the information leaked from these decryptions to learn the entire contents of some other encrypted message. A CAPTCHA is a distorted image of, say, an English word that is easy for humans to read, but hard for a computer to process. CAPTCHAs are used in order to ensure that a human user—and not some automated software—is interacting with a webpage. The encrypt-and-authenticate approach is insecure against chosen-plaintext attacks even when instantiated with standard components.