1.4Cryptographic attacks Flashcards
Birthday
Used to find collisions in hashes and allows the attacked to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the same then the original values are the same
Know plain text/cipher text
I. Plain text- The attacker has both the plain text and the encrypted version
II. Cipher text- The attacker has access only to the encrypted message
Rainbow tables
Large pregenerated data sets of encrypted passwords used in password attacks
Dictionary
A password attack that creates encrypted versions of common dictionary words and then compares them against those in the stolen password file. guessing using a list of possible passwords
Brute Force
A password crasking program that tries every possible combination of characters A-Z
Online vs. offline
I. Online- is against a live logon prompt
II. Offline- The attack is working on their own independent computers to compromise a password hash
Collision
When two different inputs produce the same has value
Downgrade
Forces a system to lessen its security, this allows the attacker to exploit the lesser security control. it is often associated with cryptographic attacks due to weak implementations of cipher suites. i.e. TLS>SSL, a man in the middle POODLE attacks exploiting TLS v1.0 - CBC mode
Replay
The attacker captures network packets and the retransmits them back to the network to gain unauthorized access
Weak implimentations
The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself