Cryptography attacks Flashcards

1
Q

Known Plaintext Attack KPA Attack

A

Attacker has some encrypted text and some plain text known as the crib. The attacker could potentially decrypt the rest of the encrypted text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rainbow table attack

A

Rainbow table is a range of hashes. Windows uses a different hashing method than my sql etc etc.

Note: Rainbow tables will not work with salted hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dictionary Attack

A

Common words/passwords. Used for brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute Force Attack

A

Brute force attack uses every combination of hash, phrase, special character in order to break in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Birthday Attack

A

Attacker uses plain text to match your hash you are using for validation. To prevent this from happening use a larger hash size to avoid collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Downgrade Attack

A

Attacker forces you to use older and weaker security mechanisms. (Force the system to downgrade their security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptographic Replay Attack

A

A hash with no salt, no session ID tracking, no encryption means you are vulnerable to a replay attack. Kerberos prevents this, Kerberos using a timestamp. If the attacker tried to replay the packets, it would not work because the timestamp is after the time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly