Cryptography -- Attacks Flashcards
Meet in the middle attack
Encrypts on one side, decrypts on the other side, and meets in the middle.
The attack is a known plaintext attack: the attacker has a copy of a matching plaintext and ciphertext, and seeks to recover the two keys used to encrypt.
Known Key
Known key means the cryptanalyst knows something about the key, to reduce the efforts used to attack it.
Differential Cryptanalysis
Seeks to find the “difference” between related plaintexts that are encrypted.
Linear Cryptanalysis
A known plaintext attack where the cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key. The pairs are studied to derive information about the key used to create them.
Side-Channel Attacks
Use physical data to break a cryptosystem, such as monitoring CPU cycles or power consumption used while encrypting or decrypting.
Implementation Attacks
Exploits a mistake (vulnerability) made while implementing an application, service or system.
Digital Signatures
Used to cryptographically sign documents.
Provides nonrepudiation.
Message Authentication Code (MAC)
A hash function that uses a key. A common MAC implementation is Cipher Block Chaining Message Authentication Code (CBC-MAC). Message Authentication Code provides integrity and authenticity.
Hashed Message Authentication Code (HMAC)
Combines a shared key with hashing.
Two parties must pre-share a key. Once shared, the sender uses XOR to combine the plaintext with a shared key, and then hashes the output using an algorithm such as MD5 or SHA-1. That hash is then combined with the key again, creating an HMAC.
The receiver combines the same plaintext with the shared key locally, and then follows the same process described above, resulting in a local HMAC. The receiver compares that with the sender’s HMAC. If the two HMACs match, the sender is authenticated, and the message’s integrity is assured.
x.509
Digital Certificate Format
Clipper Chip
Escrowed Encryption Standard (EES)
Effort announced in 1993 by the United States government to deploy escrowed encryption in telecommunication devices.
Used the Skipjack algorithm, a symmetric cipher that uses an 80-bit key.
Abandoned.