Cryptography attacks Flashcards
Known Plaintext Attack KPA Attack
Attacker has some encrypted text and some plain text known as the crib. The attacker could potentially decrypt the rest of the encrypted text.
Rainbow table attack
Rainbow table is a range of hashes. Windows uses a different hashing method than my sql etc etc.
Note: Rainbow tables will not work with salted hashes.
Dictionary Attack
Common words/passwords. Used for brute force.
Brute Force Attack
Brute force attack uses every combination of hash, phrase, special character in order to break in.
Birthday Attack
Attacker uses plain text to match your hash you are using for validation. To prevent this from happening use a larger hash size to avoid collision.
Downgrade Attack
Attacker forces you to use older and weaker security mechanisms. (Force the system to downgrade their security).
Cryptographic Replay Attack
A hash with no salt, no session ID tracking, no encryption means you are vulnerable to a replay attack. Kerberos prevents this, Kerberos using a timestamp. If the attacker tried to replay the packets, it would not work because the timestamp is after the time of day.