Cryptographic Attacks Flashcards

1
Q

Birthday attack

A

Exploit the mathematics behind the birthday problem in probability theory to cause a collision (hash type attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Side channel attack

A

Is any attack based on information gained from implementation of a computer system, rather than weaknesses in the implemented algorithm itself, monitoring cpu cycles, power consumption, radiation and timing to break the cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broken

A

Means that algorithm and/or key lenght is exploitable (use of 802.11 or DES encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Depreciated

A

Means that the use of algorithm and key length is allowed, but the user must accept the risk/weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Depreciated

A

Means that the use of algorithm and key length is allowed, but the user must accept the risk/weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Frequency analysis attack

A

Cryptovariable (key)attack, analyses patterns of frequencies (specific letters) in encrypted messages to deduce information about underlying plaintext or key used to encrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rainbow tables

A

Publicly available tables of precomputed hashes that can be used to quickly attack and crack password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force

A

Cryptovariable (key) attack, every possible key is tested (online/offline) until a key is discovered and that successfully decrypts the ciphertext . Brute force attacks are limited by Workfactor and discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Collision

A

Hash attack, uses mathematical technique to force two inputs into producing the same hash value. The hash metod used cannot be relied on any more to identify different data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Downgrade attack

A

Common and strong attack, it forces degradation to lower-quality crypto model. Attacker exploits the lesser security control from TLS to SSL, from HTTPS to http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dictionary attack

A

Cryptovariable (key) attack, a list of known keys are tested (common word list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pass the hash

A

Hash attack, attackers can use captured hashed credentials from one machine to successfully gain control of another machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Timming attack

A

Exploits the fact that different computations take different time to compute on the processor, it the encryption takes time it indicates that the secret key is long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Is a form of malware designed to encrypt files on a device and rendering them to unusable. Adds an extension to the encrypted files (.aaa,.micro) to show that the files have been encrypted. The extension is unique to ransomware. After finishing encryption ransomware displays the file with instruction how to pay to receive decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly