attacks Flashcards
cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet.
Frequency Analysis
Why should Diffie-Hellman not be used? What should we use instead?
It is vulnerable to man in the middle and downgrade attacks. Use PKI and ephemeral keys instead.
Which symmetric stream is resistant to timing attacks?
ChaCha
NOBUS
(‘nobody but us’) backdoor. This is where it is mathematically possible for government agents to crack the encryption, but no-one else can
Key escrow.
This is where a copy of the encryption key is kept in escrow so that it can be used by a government agent
Where the intruder uses brute force to decrypt the ciphertext and tries every possible key.
Exhaustive search
Known plaintext attack.
Where the intruder knows part of the ciphertext and the corresponding plaintext.
The known ciphertext and plaintext can then be used to decrypt the rest of the ciphertext.
Where the intruder sends a message to the target, this is then encrypted with the target’s private-key and the intruder then analyses the encrypted message.
For example, an intruder may send an e-mail to the encryption file server and the intruder spies on the delivered message.
Chosen-ciphertext.
Where the intruder inserts or modifies messages.
Active attack
Where the intruder takes a legitimate message and sends it into the network at some future time.
The replay system
Where the intruder mixes parts of two different encrypted messages and is able to create a new message. This message is likely to make no sense but may trick the receiver into doing something that helps the intruder.
Cut-and-paste.
Some encryption schemes use the time of the computer to create the key. Resetting this time or determining the time that the message was created can give some useful information to the intruder.
Time resetting.
Diffie-Helman handshakes are vulnerable to what?
MiTM
side path attack?
.
What three things is AES vulnerable to?
AES has proven to be free from major vulnerabilities, but poor implementation of the encryption method leaves it susceptible to attacks such as:
Brute force, use of Non-Random Numbers, and copy-and-paste.