OSG-CH7 Flashcards

1
Q

public ledger/data store that nobody can tamper with or destroy.

A

blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

specialized hardware can minimize power consumption, specialized hardware can minimize power consumption solving many low-latency requirements.

A

Lightweight Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encrypting data in a way that preserves the ability to perform computation on that data, result you would have received if you had performed the computation on the plaintext data in the first place.

A

Homomorphic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an algebraic manipulation that attempts to reduce the complexity of the algorithm. attacks focus on the logic of the algorithm itself.

A

Analytic Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an attack that exploits weaknesses in the implementation of a cryptography system. It focuses on exploiting the software code, not just errors and flaws but the methodology employed to program the encryption system.

A

Implementation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the attack exploits statistical weaknesses in a cryptosystem, such as floating-point errors and inability to produce truly random numbers. These attacks attempt to find a vulnerability in the hardware or operating system hosting the cryptography application.

A

Statistical Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attacks are quite straightforward. Such an attack attempts every possible valid combination for a key or password. They involve using massive amounts of processing power to methodically guess the key used to secure cryptographic communications.

A

Brute-Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In these attacks, the attacker attempts to compromise the integrity of a cryptographic device by causing some type of external fault

A

Fault Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer systems generate characteristic footprints of activity, such as changes in processor utilization, power consumption, or electromagnetic radiation. These attacks seek to use this information to monitor system activity and retrieve information that is actively being encrypted.

A

Side-Channel Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an example of a side-channel attack where the attacker measures precisely how long cryptographic operations take to complete, gaining information about the cryptographic process that may be used to undermine its security

A

Timing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a random value that is added to the end of the password before the operating system hashes the password. This is then stored in the password file along with the hash.

A

cryptographic salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the only information you have at your disposal is the encrypted ciphertext message

A

ciphertext-only attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

counting the number of times each letter appears in the ciphertext.

A

frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext (the copy)

A

Known Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the attacker obtains the ciphertexts corresponding to a set of plaintexts of their own choosing. This allows the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.

A

Chosen Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the attacker has the ability to decrypt chosen portions of the ciphertext message and use the decrypted portion of the message to discover the key.

A

Chosen Ciphertext

17
Q

defeat encryption algorithms that use two rounds of encryption. This attack is the reason that Double DES (2DES) was quickly discarded as a viable enhancement to the DES encryption

A

Meet in the Middle

18
Q

a malicious individual sits between two communicating parties and intercepts all communications (including the setup of the cryptographic session). The attacker responds to the originator’s initialization requests and sets up a secure session with the originator. The attacker then establishes a second secure session with the intended recipient using a different key and posing as the originator.

A

Man in the Middle (“on-path attacks”)

19
Q

the malicious individual seeks to substitute in a digitally signed communication a different message that produces the same message digest, thereby maintaining the validity of the original digital signature.

A

birthday attack

20
Q

the malicious individual intercepts an encrypted message between two parties (often a request for authentication) and then later “replays” the captured message to open a new session.

A

Replay