Cryptographic attacks Flashcards

1
Q

Used to find collisions in hashes and allows the attacker to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the same - then the original values are the same.

A

Birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Known plain/cipher text

The attacker has both the plaintext and its encrypted versions

A

Plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Known plain/cypher text

The attacker has access only to the encrypted messages

A

Cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Large pregenerated data sets of encrypted passwords used in password attacks.

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password attack that creates encrypted versions of common dictionary words and then compares them against those in a stolen password file. Guessing using a list of possible passwords.

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password-cracking program that tries every possible combination of characters A to Z.

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Online vs Offline

Against a live logon prompt

A

Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Online vs Offline

The attack is working on their own independent computers to compromise a has password.

A

Offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When twuo different inputs produce the same hash value

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Forces a system to lessen its security thus allowing for the attacker to exploit the lesser security controls. . It is most often associated with cryptographic attacks due to weak implementations of cipher suites. Example is TLS > SSL, a man-in-the-middle POODLE attack exploiting TLS v1.0 - CBC mode.

A

Downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The attacker captures network packets and then retransmits them back onto the network to gain unauthorized access.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself.

A

Weak implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly