Hashing Flashcards

1
Q

Hash

A

A one-way cryptographic function which takes an input and produces a unique message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

dont learn Message Digest 5 - MD5

A

Message Digest 5:

Algorithm that creates a fixed-length 128-bit hash value unique to the input file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision

A

Condition that occurs when two different files create the same hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Hash Algorithm - SHA

A

Secure Hash Algorithm

SHA1
Algorithm that creates a fixed-length 160-bit hash value unique to the input file

SHA2
Family of algorithms that includes SHA-224, SHA-256, SHA-348, and SHA512

SHA3
Family of algorithms that creates hash digests between 224-bits and 512- bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dont learn RACE Integrity Primitive Evaluation Message Digest: RIPEMD

A

RACE Integrity Primitive Evaluation Message Digest:

An open-source hash algorithm that creates a unique 160-bit, 256-bit, or 320-bit message digest for each input file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash-based Message Authentication Code: HMAC

A
Hash-based Message Authentication Code:
Uses a hash algorithm to create a level of assurance as to the integrity and authenticity of a given message or file
• HMAC-MD5
• HMAC-SHA1
• HMAC-SHA256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing: Digital Signatures

A

Digital signatures prevent collisions from being used to spoof the integrity of a message

Digital signatures use either DSA, RSA, ECDSA, or SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Signing

A

Uses digital signatures to provide an assurance that the software code has not been modified after it was submitted by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dont learn LANMAN (LM Hash)

A

Original version of password hashing used by Windows that uses DES and is limited to 14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

dont learn NT LAN Manager Hash (NTLM Hash)

A

Replacement for LM Hash that uses RC4 and was released with Windows NT 3.1 in 1993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

dont learn NTLMv2

A

Replacement for NTLM Hash that uses HMAC-MD5 and is considered difficult to crack

NTLMv2 is used when you do not have a domain with Kerberos for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing Attacks: Pass the Hash

A

hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user’s password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password with merely stealing the hash and using that to authenticate with.

After an attacker obtains valid user name and user password hash values (somehow, using different methods and tools), they are then able to use that information to authenticate to a remote server or service using LM or NTLM authentication without the need to brute-force the hashes to obtain the cleartext password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing Attacks: Birthday Attack

A

Technique used by an attacker to find two different messages that have the same identical hash digest
▪ 99% chance of finding a matching birthday in a 57-person group
▪ 50% chance of finding a matching birthday in a 23-person group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Increasing Hash Security: Key Stretching

A

the practice of converting a password to a longer and more random key for cryptographic purposes such as encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Increase Hash Security: Salting

A

Adding random data into a one-way cryptographic hash to help protect against password cracking techniques

A “nonce” is used to prevent password reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly