Cryptographic Attacks Flashcards
1
Q
What is exploited by Meet-in-the-middle attacks?
A
protocols that use two rounds of encryption (e.g. 2DES)
2
Q
What is the goal of a Birthday attack?
A
finding collisions in hash functions
3
Q
What is the goal of a Replay attack?
A
reusing authentication requests