Attacks on Cryptography, Hashing, Digital Signatures Flashcards

1
Q

attack using the entire key space (every possible key) and every single combo

can be time consuming

A

brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

prevents brute force attacks by adding 1-2 seconds to password verification

A

key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Similar to frequency analysis but rather looks for common pairs of letter (TH, HE, ER)

A

Diagraph Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker secretly relays and may alter communication between two parties who believe they are directly communicating to each other

A

man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker takes over a web user’s session ID and masquerades as the authorized user.

A

Session hijacking

aka TCP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Precompiled lists of plaintext and matching ciphertexts

A

rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attacker knows plaintext and ciphertext and by using those can figure out the key

A

known plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Similar to known plaintext but attacker also chooses the plaintext then tries to figure out the key

A

chosen plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

same as chosen plaintext but attacker ‘adapts’ to following rounds dependent on the previous rounds

A

adaptive chosen plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A known plain text attack, the intruder knows some parts of the plaintext and ciphertexts which have two or more secret keys for multiple encryptions using the same algorithm

A

meet-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attacker knows something about the key

A

known key attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tries to find difference between related plaintext

A

differential cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attacker has a ton of plaintext and ciphertext pairs and studies the pairs to learn information about the key

A

linear cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

differential and linear cryptanalysis combined but the attacker looks for non randomness

A

differential linear cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using physical data to find flaws in a system. This can be CPU cycles or power consumption etc…

A

side channel attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack where a vulnerability is left from the implementation of an application

A

Implementation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When 2 different symmetric keys used on the same plaintext produce the same ciphertext, both can decrypt ciphertext from the other key

A

key clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attacker steals hashed password and gains access to the system by using the stolen hash

A

pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Similar to pass the hash but used when NTLM is disabled to request a TGT to Kerberos server with user’s hash

A

Overpass the hash

20
Q

Attacker attempts to collect tickets held in the lsass.exe process the injects the ticket to impersonate the user

A

pass the ticket

21
Q

Attacker uses NTLM hash to make a TGS ticket. This gives attacker privileges granted to that specific account

A

silver ticket

22
Q

The attacker gains access to the hash of the Kerberos service account and creates any ticket in Active Directory. The account encrypts all Kerberos tickets with a hash of its own and it never changes.

A

golden ticket

23
Q

Attackers can guess passwords and usernames by using a script kerbute.py on Linux or Rubeus because Kerberos will report whether the username is valid or not

A

Kerberos Brute-Force

24
Q

Enables attackers to decrypt tickets and client’s password using offline attacks due to pre-authentication is not enabled

A

ASREPRoast

25
Q

The attacker collect TGS tickets and decrypts them offline and uses them on accounts without pre-authentication enabled

A

Kerberoasting

26
Q

The attacker tries to compromise the integrity of crypto devices by introducing external faults (ex: temperature controls)

A

Fault injection

27
Q

When keys are kept by a 3rd party organization (often law enforcement)

A

Key Escrow

28
Q

Digital signatures provide integrity and ______-

A

non repudiation

29
Q

This person issues and revokes certificates

A

CA (certification authority)

30
Q

Authenticates the certificate holder prior to certificate issuance

Done within organization

A

ORA (organizational registration authorities)

31
Q

certificates are revoked if a private key is compromised

this list is maintained by the CA

A

CRL (certificate revocation list)

32
Q

Client/server hybrid to check certificate expiration dates. A dynamic version of CRL

A

OCSP (online certification status protocol)

33
Q

Chip promoted by the NSA to provide secured voice and data messages but had built in backdoor features. It used Skipjack

A

Clipper chip

34
Q

Hash function using a key to provide authenticity and integriity

A

MAC (message authentication code)

35
Q

Combines a shared key with hashing

A preshared key is exchanged

A

HMAC (hashed message authentication code)

36
Q

Set of protocols that provide a cryptographic layer to IP traffic

Often used for VPNs

A

IPSEC

37
Q

Part of IPSEC suite that provides authentication and integrity for each packet

protects against replay attacks

A

AH (authentication header)

38
Q

Part of IPSEC suite that provides confidentiality for each packet

A

ESP (encapsulation security payload)

39
Q

Part of IPSEC suite. Simplex connection used to negotiate ESP and AH parameters

A

Security Association (SA)

40
Q

Part of IPSEC suite that manages SA creation process and key exchange mechanics

A

ISAKMP (internet security and key management protocol)

41
Q

IPSEC mode that encrypts and authenticates the entire package including the headers

A

Tunnel mode

42
Q

IPSEC mode that encrypts and authenticates the payload

A

Transport mode

43
Q

IPSEC mode that uses different types of encryption and hashes and selects the fastest and most secure pair

A
44
Q

Uses a web of trust model to authenticate digital certificates (if you trust me, you trust everyone i trust)

A

Pretty Good Privacy (PGP)

45
Q

Provides a standard way to format email

Not secure

A

MIME (multipurpose internet mail extensions)

46
Q

Uses PKI to encrypt and authenticate MIME encoded email

A

S/MIME (Secure/MIME)