CAPEC-97: Cryptanalysis
Description
Extended Description
Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first flows through the adversary, who has the opportunity to observe or alter it, before being passed on to the intended recipient as if it was never observed. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for these attacks yields an implicit lack of trust in communication or identify between two components.
These attacks differ from Sniffing Attacks (CAPEC-157) since these attacks often modify the communications prior to delivering it to the intended recipient.
Severity :
Very High
Possibility :
Low
Type :
Standard
Relationships with other CAPECs
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Prerequisites
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- The target software utilizes some sort of cryptographic algorithm.
- An underlying weaknesses exists either in the cryptographic algorithm used or in the way that it was applied to a particular chunk of plaintext.
- The encryption algorithm is known to the attacker.
- An attacker has access to the ciphertext.
Skills required
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- High Cryptanalysis generally requires a very significant level of understanding of mathematics and computation.
Taxonomy mappings
Mappings to ATT&CK, OWASP and other frameworks.
Resources required
Computing resource requirements will vary based on the complexity of a given cryptanalysis technique. Access to the encryption/decryption routines of the algorithm is also required.
Related CWE
A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful.
CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE-1204: Generation of Weak Initialization Vector (IV)
CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation
CWE-1241: Use of Predictable Algorithm in Random Number Generator
CWE-1279: Cryptographic Operations are run Before Supporting Units are Ready
Visit http://capec.mitre.org/ for more details.