BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/5547170587475968/lesson/59bfae36529662012aa569cd04e6260a?ref=outlook-calendar
SUMMARY:The Second Phase – Recovering
DTSTART;TZID=America/Los_Angeles:20260502T190000
DTEND;TZID=America/Los_Angeles:20260502T200000
LOCATION:https://www.learndesk.us/class/5547170587475968/lesson/59bfae36529662012aa569cd04e6260a?ref=outlook-calendar
DESCRIPTION: 
















The Second Phase – Recovering Further Plaintext An attacker who has conducted the first phase against an encrypted inner datagram of the form C0, C1, . . . , Cq does not need to repeat it in order to obtain decrypted versions of further inner datagrams. The further datagrams need not even be destined for or originate from the same pair of hosts. Instead, the contents of new datagrams can be recovered much more efficiently, as follows.

The attacker then uses this modified byte sequence as the encrypted payload of an outer datagram. This construction (illustrated in Figure 4) ensures that, upon decryption by the security gateway, the payload is correctly padded and is interpreted as an inner datagram with a valid header and a destination address equal to AttAddr. This datagram will be routed to the attacker’s machine (for the same reasons that the successful datagram from the main attack was). From this datagram, a total of 64(q − 6) bits of plaintext from the new...

https://www.learndesk.us/class/5547170587475968/lesson/59bfae36529662012aa569cd04e6260a?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR