attacks Flashcards

1
Q

cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet.

A

Frequency Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why should Diffie-Hellman not be used? What should we use instead?

A

It is vulnerable to man in the middle and downgrade attacks. Use PKI and ephemeral keys instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which symmetric stream is resistant to timing attacks?

A

ChaCha

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NOBUS

A

(‘nobody but us’) backdoor. This is where it is mathematically possible for government agents to crack the encryption, but no-one else can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key escrow.

A

This is where a copy of the encryption key is kept in escrow so that it can be used by a government agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where the intruder uses brute force to decrypt the ciphertext and tries every possible key.

A

Exhaustive search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Known plaintext attack.

A

Where the intruder knows part of the ciphertext and the corresponding plaintext.

The known ciphertext and plaintext can then be used to decrypt the rest of the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where the intruder sends a message to the target, this is then encrypted with the target’s private-key and the intruder then analyses the encrypted message.

For example, an intruder may send an e-mail to the encryption file server and the intruder spies on the delivered message.

A

Chosen-ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where the intruder inserts or modifies messages.

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where the intruder takes a legitimate message and sends it into the network at some future time.

A

The replay system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where the intruder mixes parts of two different encrypted messages and is able to create a new message. This message is likely to make no sense but may trick the receiver into doing something that helps the intruder.

A

Cut-and-paste.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some encryption schemes use the time of the computer to create the key. Resetting this time or determining the time that the message was created can give some useful information to the intruder.

A

Time resetting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Helman handshakes are vulnerable to what?

A

MiTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

side path attack?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What three things is AES vulnerable to?

A

AES has proven to be free from major vulnerabilities, but poor implementation of the encryption method leaves it susceptible to attacks such as:
Brute force, use of Non-Random Numbers, and copy-and-paste.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Difference between Time attack and Time resetting?

A

Time attack - analyzing the amount of time needed for decryption to calculate the key.

Time resetting - Changing or observing the local time on a device to foil certain encryption schemes.

17
Q

What is RSA vulnerable to?

A

RSA suffers from several weaknesses and is susceptible to numerous attacks and cracking methods including factorization of prime numbers used within the algorithm.

18
Q

What addresses the problems of brute forcing an MD5 hash?

A

The APR1 format combats this by iterating the hash value 1,000 times and salting the value.

19
Q

What addresses the problems of brute forcing an MD5 hash?

A

The Apache-defined APR1 format combats this by iterating the hash value 1,000 times and salting the value.

20
Q

Looks for a rollover of the same value for an IV

A

Replay attack

21
Q

Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?

A

AES

22
Q

Which type of cipher is ChaCha?

A

stream

23
Q

What is SHA hashed stored passwords vulnerable to and why?

A

SHA method has for storing passwords does not have a salt making it open to rainbow table attacks and brute force.

24
Q

This is where part of the message has some significance to the original and generates the same hash signature. This is defined as a Pre-image attack.

A

Similar context.

25
Q

This is where an alternative message is created with the same hash signature and has a direct relation to the original message. This is an extension to a Pre-image attack.

A

Full context.

26
Q

Methods to combat DHE_EXPORT Downgrade attacks on Diffie Hellman include:

A

Disabling Export Cipher Suites
Using (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE)
Use a strong group.

27
Q

A weakness discovered in Diffie Hellman is that it is…

A

fairly easy to precompute on values for two popular Diffie-Hellman parameters (which use the DHE_EXPORT cipher set).

28
Q

a method of attacking/discovering polyalphabetic substitution keywords

A

Kasiski examnation

29
Q

the attacker has an access to the ciphertext and its corresponding plaintext

A

known-plaintext attack

30
Q

difference between MiTM and active attack?

A

active attack - attacker interfering between two parties and sometimes intercepting or modifying data in the communication stream

MiTM - attacker impersonating both parties involved in a communication stream

31
Q

copy-paste attack mitigation for AES?

A

OFB loop

32
Q

differential vs linear analysis?

A

linear - finds similarities

differential - finds differences