← Home
Risks
1. Ciphertext-Only Attack: A ciphertext-only attack occurs when an adversary has access to ciphertext messages, but not the associated plaintext messages or keys. In this scenario, the adversary could determine patterns in the ciphertext messages and decipher the unsuspecting user's data.
2. Known-Plaintext Attack: In a known-plaintext attack, an adversary has access to a plaintext message and its associated ciphertext, giving them the information needed to determine parts of the key.
3. Chosen-Plaintext Attack: During a chosen-plaintext attack, an adversary attempts to obtain the AES key by selecting plaintext messages and examining the associated ciphertext. This data can then be used to determine the encryption key.
4. Side-Channel Attack: Side-channel attacks involve the exploitation of physical systems through an analysis of system resources such as processor activity and power consumption. By monitoring these parameters, an attacker can gain access to sensitive information.