Cryptographic Attacks 2.4 Flashcards

1
Q

Birthday Attack

A
  • Gets its name from the Bday paradox
  • A hash collision is the same hash value for two different plaintexts
  • Found through brute force
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection Against Birthday Attack

A
  • Create large hash output size
  • The larger the hash size the more difficult to duplicate the hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision Attack

A
  • Two different input yield the same output of a hash function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Downgrade Attack

A
  • Purpose, to use a weaker form of encryption or not use any encryption at all.
  • Forces the system to downgrade the security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Socket Layer (SSL) Stripping

A
  • Combines an on-path attack with a downgrade attack
  • Attack sits in the middle of the conversation.
  • Causes the victim to not use the non-encrypted HTTP protocol.
  • The attacker will be able to monitor all traffic from the user and the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly