Domain 3: Cryptography Attacks and Implementing Flashcards

1
Q

Algebraic manipulation that attempts to reduce the complexity of the algorithm

A

Analytic Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack that focus on the exploiting of the software code of cryptography system

A

Implementation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack that attempts to find the vulnerability in the hardware or OS hosting the cryptography application

A

Statistical Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack that involves massive processing power to methodically guess the key used to secure cryptographic communications

A

Brute-Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker has a copy of the message in both encrypted and plaintext format from here he can derive the key that was used

A

Known Plaintext Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker has the ability to encrypt plaintext messages of their choosing and can then analyze the ciphertext output of the encryption algorithm

A

Chosen Plaintext Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Cryptanalyst has the ability to decrypt chosen portions of ciphertext message and use the decrypted portion of the message to discover the key
  • Mirrors plaintext attacks
  • Usually used against asymmetric cryptosystems
A

Chosen Ciphertext Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacker seeks to substitute in a digitally signed communication with a different message that produces the same message digest, thereby maintaining the validity of the original digital signature

A

Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalyst knows something about the key and uses this knowledge to attack

A

Known Key Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Seeks to find the difference between related plaintexts that are encrypted

A

Differential Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Cryptanalyst finds a large amount of plaintext/ciphertext pairs created with the same key
  • The pairs are studied to derive information about the key used to create them
A

Linear Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Uses physical data to break a cryptosystem

- i.e. monitoring CPU cycles or power consumption used while encrypting and decrypting

A

Side-Channel Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Authenticates identity of the signer and proof of document’s integrity
  • Provides nonrepudiation
A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key signed with a digital signature

A

Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organization registration authority that authenticates the identity of a certificate holder before issuing a certificate to them

A

Certificate Authorities (CAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When obtaining a digital certificate you must first prove your identity to the CA. This process is called…

A

Enrollment

17
Q

List of revoked certificates

A

Certificate Revocation Lists (CRL)

18
Q

Replacements for Certificate Revocation Lists (CRL) and uses client-server design that scales better

A

Online Certificate Status Protocol (OCSP)

19
Q
  • Software that uses encryption to enforce copyright restrictions on digital media
  • i.e. Music, movies, e-book, video games, and documents
A

Digital Rights Management (DRM)

20
Q
  • IPSec protocol
  • Acts as a digital signature for data
  • Protects against replay attacks
  • Provides no confidentiality
A

Authentication Header (AH)

21
Q
  • IPSec protocol

- Encrypted packet data

A

Encapsulating Security Payload (ESP)

22
Q
  • IPSec protocol

- One-way connection used to negotiate ESP or AH parameters

A

Security Association (SA)

23
Q
  • IPSec protocol

- Manages the SA creation process

A

Internet Security Association and Key Management Protocol (ISAKMP)

24
Q
  • IPSec protocol

- Encrypts the entire packet, including original packet headers

A

ESP Tunnel Mode

25
Q
  • IPSec protocol

- Only encrypts the data, not the original headers

A

ESP Transport Mode

26
Q
  • IPSec protocol
  • Negotiates the algorithm selection process
  • Both sides of the IPSec tunnel will typically use IKE to negotiate the highest and fastest level of security (i.e. selecting AES over single DES)
A

IKE

27
Q
  • Asymmetric encryption
  • Used to encrypt emails, documents, or disk drives
  • Used web of trust model to authenticate digital certificates instead of a central CA
A

Pretty Good Privacy (PGP)

28
Q
  • Asymmetric encryption

- Leverages PKI to encrypt and authenticate MIME-encoded email

A

S/MIME (Secure MIME)

29
Q
  • Third-party organization holds copy of public/private key pair
  • Failsafe that allows access to sensitive data when the need arises
A

Escrowed Encryption

30
Q
  • The examination of repetition of characters in a given encrypted message
  • Repeating patterns may indicate the type of cipher being used i.e. substitution or transposition
A

Frequency analysis

31
Q

Exploits cryptographic protocols that use two rounds of encryption

A

Meet-in-the-middle attack

32
Q

Procedure to digitally sign a message

A
  1. Use a hash function to generate a message digest

Then encrypt the digest with your private key

33
Q

Procedure to verify the digital signature on a message

A
  1. Decrypt the signature with the sender’s public key and then compare the message digest to the one you generate yourself
  2. If they match the message is authentic
34
Q
  • NIST standard created to specify the digital signature algorithms acceptable for Federal Gov use
  • Requires that SHA-3 hashing function be used for all digital signatures
  • Allowed encryption algorithms include:
    1. Digital Signature Algorithm (DSA)
    2. Rivest, Shamir, Adleman (RSA)
    3. Elliptic Curve DSA (ECDSA)
A

Digital Signature Standard (DSS)