1.4Cryptographic attacks Flashcards

1
Q

Birthday

A

Used to find collisions in hashes and allows the attacked to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the same then the original values are the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Know plain text/cipher text

A

I. Plain text- The attacker has both the plain text and the encrypted version
II. Cipher text- The attacker has access only to the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rainbow tables

A

Large pregenerated data sets of encrypted passwords used in password attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dictionary

A

A password attack that creates encrypted versions of common dictionary words and then compares them against those in the stolen password file. guessing using a list of possible passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute Force

A

A password crasking program that tries every possible combination of characters A-Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Online vs. offline

A

I. Online- is against a live logon prompt

II. Offline- The attack is working on their own independent computers to compromise a password hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision

A

When two different inputs produce the same has value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Downgrade

A

Forces a system to lessen its security, this allows the attacker to exploit the lesser security control. it is often associated with cryptographic attacks due to weak implementations of cipher suites. i.e. TLS>SSL, a man in the middle POODLE attacks exploiting TLS v1.0 - CBC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replay

A

The attacker captures network packets and the retransmits them back to the network to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Weak implimentations

A

The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly