Test 2 Flashcards
Known-plaintext attack
An attacker has access to previous plaintext-ciphertext pair in addition to the intercepted ciphertext
Chosen plaintext attack
Attacker had access to the ciphertext, the encryption machine, and plaintext-ciphertext pairs that they have generated with the encryption machine
Chosen ciphertext attack
The attacker has access to the ciphertext, the decryption algorithm, and plaintext-ciphertext pairs that they have generated using the decryption algorithm
2DES is vulnerable to….
Meet in the middle attacks
RSA is vulnerable to…
Chosen ciphertext attacks
What is a cryptographic work function
A value to compute the strength of encryption, often measured in time and effort to brute force encrypted data
Polyalphabetic ciphers include:
Vignere cipher, running-key cipher (uses a passage in a book), and cipher disk (two disks of the alphabet rotated after letter substitutions change)
XSRF/CSRF
Redirects static content to steal info (like banking info). Can be mitigated with CAPTCHA, two-factor auth, or by adding annonce to web requests