Cryptographic attacks Flashcards
Used to find collisions in hashes and allows the attacker to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the same - then the original values are the same.
Birthday
Known plain/cipher text
The attacker has both the plaintext and its encrypted versions
Plain text
Known plain/cypher text
The attacker has access only to the encrypted messages
Cipher text
Large pregenerated data sets of encrypted passwords used in password attacks.
Rainbow tables
Password attack that creates encrypted versions of common dictionary words and then compares them against those in a stolen password file. Guessing using a list of possible passwords.
Dictionary
Password-cracking program that tries every possible combination of characters A to Z.
Brute force
Online vs Offline
Against a live logon prompt
Online
Online vs Offline
The attack is working on their own independent computers to compromise a has password.
Offline
When twuo different inputs produce the same hash value
Collision
Forces a system to lessen its security thus allowing for the attacker to exploit the lesser security controls. . It is most often associated with cryptographic attacks due to weak implementations of cipher suites. Example is TLS > SSL, a man-in-the-middle POODLE attack exploiting TLS v1.0 - CBC mode.
Downgrade
The attacker captures network packets and then retransmits them back onto the network to gain unauthorized access.
Replay
The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself.
Weak implementations