Section 8.80 Cryptographic Attacks Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.

1
Q

Cryptographic Attacks

A

Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Downgrade Attacks

A

Force systems to use weaker or older cryptographic standards or protocols

■ Exploit known vulnerabilities or weaknesses in outdated versions

■ Countermeasures include phasing out support for insecure protocols and
version-intolerant checks

■ Example: POODLE attack on SSL 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision Attacks

A

Find two different inputs producing the same hash output

■ Undermine data integrity verification relying on hash functions

■ Vulnerabilities in hashing algorithms, e.g., MD5, can lead to collisions

■ Birthday Paradox or Birthday Attack: The probability that two distinct inputs, when processed through a hashing function, will produce the same output, or a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Quantum Computing Threat

Quantum computing

A

● A computer that uses quantum mechanics to generate and manipulate quantum bits (Qubits) in order to access enormous processing powers.

● Uses quantum bits (qubits) instead of using ones and zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quantum Computing Threat

Quantum Communication

A

A communications network that relies on qubits made of photons (light) to send multiple combinations of ones and zeros simultaneously which results in tamper resistant and extremely fast communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Quantum computing is designed for very specific use cases

A

● Complex math problems

● Trying to do something like the modeling of an atom or atomic structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Qubit

A

A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeros at the same time through superposition

● Enable simultaneous processing of multiple combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Quantum Threat

A

Threat to traditional encryption algorithms (RSA, ECC) by rapid factorization of large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Post-quantum cryptography

A

● A new kind of cryptographic algorithm that can be implemented using
today’s classic computers but is also impervious to attacks from future
quantum computers

● Aims to create algorithms resistant to quantum attacks

● First method is to create post-quantum cryptography is to increase the

key size
○ Increases the number of permutations that are needed to be
brute-forced

Second method is to create something like lattice-based cryptography
and super singular isogeny key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST selected four post-quantum cryptography standards

A

● CRYSTALS-Kyber - general encryption needs

● Digital signatures
○ CRYSTALS-Dilithium
○ FLACON
○ SPHINCS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly