3-25.1 Cryptographic Attacks Flashcards
1
Q
When two different hash inputs produce the same hash output
A
Collision
2
Q
An attack that forces a system into using a lesser crypto mode
A
Downgrade
3
Q
Term used to describe an algorithm and/or key length that is exploitable and not be used
A
Deprecated/Broken
4
Q
An attack that uses physical data inputs
A
Side channel attack
5
Q
An attack which captured hashed credentials from one machine to gain control of another machine
A
Pass-the-Hash attack