Cryptographic Attacks Flashcards

1
Q

What is a Downgrade Attack?

A

Forces a system to use a weaker or standard cryptographic protocol than what its using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Collision Attack?

A

Aims to find two different inputs that produces the same hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the “Birthday Paradox” with the “Birthday Attack”

A

The possibility that two distinct inputs will, when processed through a hashing function will produce the same hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Quantum Computing?

A

A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Quantum Communications?

A

A communications network that relies on qubits made of photons (light) to send multiple combinations of ones and zeroes simultaneously which results in tamper resistant and extremely fast communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Post-quantum cryptography?

A

A new kind of cryptographic algorithm that can be implemented using todays classical computers but is also impervious to attacks from future quantum computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly