OSG-CH7 Flashcards
public ledger/data store that nobody can tamper with or destroy.
blockchain
specialized hardware can minimize power consumption, specialized hardware can minimize power consumption solving many low-latency requirements.
Lightweight Cryptography
encrypting data in a way that preserves the ability to perform computation on that data, result you would have received if you had performed the computation on the plaintext data in the first place.
Homomorphic encryption
an algebraic manipulation that attempts to reduce the complexity of the algorithm. attacks focus on the logic of the algorithm itself.
Analytic Attack
an attack that exploits weaknesses in the implementation of a cryptography system. It focuses on exploiting the software code, not just errors and flaws but the methodology employed to program the encryption system.
Implementation Attack
the attack exploits statistical weaknesses in a cryptosystem, such as floating-point errors and inability to produce truly random numbers. These attacks attempt to find a vulnerability in the hardware or operating system hosting the cryptography application.
Statistical Attack
attacks are quite straightforward. Such an attack attempts every possible valid combination for a key or password. They involve using massive amounts of processing power to methodically guess the key used to secure cryptographic communications.
Brute-Force Attack
In these attacks, the attacker attempts to compromise the integrity of a cryptographic device by causing some type of external fault
Fault Injection Attack
Computer systems generate characteristic footprints of activity, such as changes in processor utilization, power consumption, or electromagnetic radiation. These attacks seek to use this information to monitor system activity and retrieve information that is actively being encrypted.
Side-Channel Attack
an example of a side-channel attack where the attacker measures precisely how long cryptographic operations take to complete, gaining information about the cryptographic process that may be used to undermine its security
Timing Attack
a random value that is added to the end of the password before the operating system hashes the password. This is then stored in the password file along with the hash.
cryptographic salt
the only information you have at your disposal is the encrypted ciphertext message
ciphertext-only attack.
counting the number of times each letter appears in the ciphertext.
frequency analysis
the attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext (the copy)
Known Plaintext
the attacker obtains the ciphertexts corresponding to a set of plaintexts of their own choosing. This allows the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.
Chosen Plaintext