Cryptopgraphy Flashcards
Cryptography
Hashing is used for
INTEGRITY
- Does not provide confidentiality or Availability
Cryptography
Hash collision is what
Hashing of 2 different sets of data, 2 different types of plaintext provide the same hash
Cryptography
What is a Hash function
VARIABLE LENGTH plaintext (input) is hased into FIXED LENGTH value (output) or Message Digest (MD)
Cryptography
MD5 fixed length hash
128 bit
Cryptography
8 Hash functions
SHA 1
SHA 2
SHA 3
HAVAL
RIPEMD
RIPEMD160
Salt (Salting)
Nonce
SHA - Secure Hash Algorithm
HAVAL - Hash of Variable Length
RIPEMD developed to ensure no government backdoors
Cryptography
HAVAL
Hash Digest length variable lengths
128 bits
169 bits
192 bits
224 bits
256 bits
Cryptography
Primary function and method of salting
Prevent dictionary attacks
Random data used as additional input to one way function
Cryptography
Primary function of Nonce
Random number issue in authentication protocol to ensure old communications cannot be reused in replay attacks
Nonce - Number Once
Cryptography
3 types of encryption
- Asymmetric
- Symmetric
- Hybrid Encryption
Asymmetric
* Does not need pre shared key. 2 keys per user i.e. 2 users, 4 keys. 10 users, 20 keys
* Slower, weaker per bit
Symmetric
* Faster, stronger per bit
* Needs pre-shared key.. Unmanagable with many users
Hybrid
* Uses Asymmetric encryption to share a symmetric key
Cryptography attacks
Steal the key
Recover the private key
Cryptography attacks
Brute force
Use entire key space and every possibly entry
Time consuming
Lots of false positives
Cryptography attacks
Key Stretching
Adds 1-2 seconds to password verification
Makes brute forcing unfeasible as time involved is to long
Cryptography attacks
Digraph attack
Looks for common pairs of letters
(TH, HE, IN, ER)
Similar to frequency analysis
Determine how often particular letters are used
Cryptography attacks
Man-in-the-middle (MITM)
Attack in middle, relays and may alter communication between 2 parties
Cryptography attacks
Session Hijacking
(TCP Session hijacking)
Attacker takes over web users session ID and masquerades as the authorised user
Session IDs are predictable
Cryptography attacks
Social Engineering
Convincing people to give up information by manipulating their trust
Authority
Intimidation
Consensus
Scarcity
Urgency
Familiarity
Cryptography attacks
Social engineering Techniques
- Authority
- Intimidation
- Consensus
- Scarcity
- Urgency
- Familiarity
- Someone you believe you trust tells you to do something
- If you do not do something, then something bad will happen
- Following the crowd - everyone else was doing it
- Only a few things left available
- Do it now or under time constraints
- Common ground between you and the attacker to build trust
Cryptography attacks
Rainbow Table
List of plaintext and matching ciphertexts
Cryptography attacks
Known Plaintext
Knowing plaintext and cipher text allows you to try and figure out the key
Cryptography attacks
Adaptive Chosen Plaintext
Similar to chosen plaintext but attack “adapts” following rounds
Cryptography attacks
Meet in the middle
Attacker has to know some parts of the plaintext and ciphertext
Cryptography attacks
Known Key
Attacker knows “something” about the key
8 characters, first letter has to be a capital
Makes targeting brute force or alternative methods easier
Cryptography attacks
Differential Cryptananalysis
Trying to determine the difference between plaintexts
Tries to find the difference between the related plaintexsts; if the plaintext are only a few bits different, cant we discern anything
Cryptography attacks
Linear Cryptanalysis
Attacker has a lot of plaintext/ciphertext pairs created with the same key
Attacker studies the pairs to learn information to deipher the key used
Cryptography attacks
Differential Linear Cryptanalysis
Differential and Linear Cryptanalysis combined
Cryptography attacks
Side Channel Attack
Attackers use physical data to break a crypto system
CPU cycles
pwoer consumption while encrypting
Cryptography attacks
Implementation Attacks
Vulnerability left behind from poor or improper implementation
Easier to find a flaw in the system than break cryptography
Cryptography attacks
Key Clustering
2 different symmetric keys used to produce same ciphertext
When 2 different symmetric keys used on the same plaintext produce the same ciphertext, both can decrypt ciphertext from the other key
Cryptography attacks
Pass the hash
Attacker obtains a hased password and can pass it on to a system
Kerberos Exploitation
Overpass the Hash
Used when NTLM is disabled
NTLM = New Technology Lan Manager
* Suite of microsoft protocols for authentication
Kerberos Exploitation
Pass the Ticket
Attackets collect tickets held in the Isass.exe process
Inject tickets impersonating the user