Domain 3: Cryptography Attacks and Implementing Flashcards
Algebraic manipulation that attempts to reduce the complexity of the algorithm
Analytic Attack
Attack that focus on the exploiting of the software code of cryptography system
Implementation Attack
Attack that attempts to find the vulnerability in the hardware or OS hosting the cryptography application
Statistical Attack
Attack that involves massive processing power to methodically guess the key used to secure cryptographic communications
Brute-Force Attack
Attacker has a copy of the message in both encrypted and plaintext format from here he can derive the key that was used
Known Plaintext Attack
Attacker has the ability to encrypt plaintext messages of their choosing and can then analyze the ciphertext output of the encryption algorithm
Chosen Plaintext Attack
- Cryptanalyst has the ability to decrypt chosen portions of ciphertext message and use the decrypted portion of the message to discover the key
- Mirrors plaintext attacks
- Usually used against asymmetric cryptosystems
Chosen Ciphertext Attacks
Attacker seeks to substitute in a digitally signed communication with a different message that produces the same message digest, thereby maintaining the validity of the original digital signature
Birthday attack
Cryptanalyst knows something about the key and uses this knowledge to attack
Known Key Attack
Seeks to find the difference between related plaintexts that are encrypted
Differential Cryptanalysis
- Cryptanalyst finds a large amount of plaintext/ciphertext pairs created with the same key
- The pairs are studied to derive information about the key used to create them
Linear Cryptanalysis
- Uses physical data to break a cryptosystem
- i.e. monitoring CPU cycles or power consumption used while encrypting and decrypting
Side-Channel Attacks
- Authenticates identity of the signer and proof of document’s integrity
- Provides nonrepudiation
Digital Signatures
Public key signed with a digital signature
Digital Certificate
Organization registration authority that authenticates the identity of a certificate holder before issuing a certificate to them
Certificate Authorities (CAs)