These are specific threats we are accounting for when designing cryptosystems. Games Ciphertext-Only Attack Brute Force Known Plaintext Attack Replay Attack CPA ACPA CCA ACCA Lunchtime Attack CPCA Related Key Attack Known Key Distinguishing Attack Evil Maid Attack Side Channel Attack