Cryptographic Attacks Flashcards

1
Q

What is exploited by Meet-in-the-middle attacks?

A

protocols that use two rounds of encryption (e.g. 2DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of a Birthday attack?

A

finding collisions in hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the goal of a Replay attack?

A

reusing authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly