Cryptographic Attacks Flashcards

1
Q

What is a Birthday Attack

A

Used to find collisions in hashes and allows the attacker to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the the same, then the original values are the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Known Plain Text Attack?

A

The attacker has both the plaintext and its encrypted version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Known Cipher Text Attack?

A

The attacker has access only to the encrypted messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Rainbow Tables?

A

Large pregenerated data sets of encrypted passwords used in password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Dictionary Attack?

A

A password attack that creates encrypted versions of common dictionary words and then compares them against those in a stolen password file. Guessing using a list of possible passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Brute Force Attack?

A

A password-cracking program that tries every possible combination of characters through A to Z.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Online Attack?

A

Attack is against a live logon prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Offline Attack?

A

The attack is working on their own independent computers to compromise a password hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Collision Attack?

A

When two different inputs produce the same hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Downgrade Attack?

A

Forces a system to lessen its security, this allows for the attacker to exploit the lesser security control. It is most often associated with cryptographic attacks due to weak implementations of cipher suites. Example is TLS > SSL, a man-in-the-middle POODLE attack exploiting TLS v1.0 - CBC mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Replay Attack?

A

The attacker captures network packets and then retransmits them back onto the network to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Weak Implementation?

A

The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly