Attacks on Cryptography, Hashing, Digital Signatures Flashcards

(46 cards)

1
Q

attack using the entire key space (every possible key) and every single combo

can be time consuming

A

brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

prevents brute force attacks by adding 1-2 seconds to password verification

A

key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Similar to frequency analysis but rather looks for common pairs of letter (TH, HE, ER)

A

Diagraph Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker secretly relays and may alter communication between two parties who believe they are directly communicating to each other

A

man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker takes over a web user’s session ID and masquerades as the authorized user.

A

Session hijacking

aka TCP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Precompiled lists of plaintext and matching ciphertexts

A

rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attacker knows plaintext and ciphertext and by using those can figure out the key

A

known plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Similar to known plaintext but attacker also chooses the plaintext then tries to figure out the key

A

chosen plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

same as chosen plaintext but attacker ‘adapts’ to following rounds dependent on the previous rounds

A

adaptive chosen plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A known plain text attack, the intruder knows some parts of the plaintext and ciphertexts which have two or more secret keys for multiple encryptions using the same algorithm

A

meet-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attacker knows something about the key

A

known key attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tries to find difference between related plaintext

A

differential cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attacker has a ton of plaintext and ciphertext pairs and studies the pairs to learn information about the key

A

linear cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

differential and linear cryptanalysis combined but the attacker looks for non randomness

A

differential linear cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using physical data to find flaws in a system. This can be CPU cycles or power consumption etc…

A

side channel attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack where a vulnerability is left from the implementation of an application

A

Implementation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When 2 different symmetric keys used on the same plaintext produce the same ciphertext, both can decrypt ciphertext from the other key

A

key clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attacker steals hashed password and gains access to the system by using the stolen hash

A

pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Similar to pass the hash but used when NTLM is disabled to request a TGT to Kerberos server with user’s hash

A

Overpass the hash

20
Q

Attacker attempts to collect tickets held in the lsass.exe process the injects the ticket to impersonate the user

A

pass the ticket

21
Q

Attacker uses NTLM hash to make a TGS ticket. This gives attacker privileges granted to that specific account

A

silver ticket

22
Q

The attacker gains access to the hash of the Kerberos service account and creates any ticket in Active Directory. The account encrypts all Kerberos tickets with a hash of its own and it never changes.

A

golden ticket

23
Q

Attackers can guess passwords and usernames by using a script kerbute.py on Linux or Rubeus because Kerberos will report whether the username is valid or not

A

Kerberos Brute-Force

24
Q

Enables attackers to decrypt tickets and client’s password using offline attacks due to pre-authentication is not enabled

25
The attacker collect TGS tickets and decrypts them offline and uses them on accounts without pre-authentication enabled
Kerberoasting
26
The attacker tries to compromise the integrity of crypto devices by introducing external faults (ex: temperature controls)
Fault injection
27
When keys are kept by a 3rd party organization (often law enforcement)
Key Escrow
28
Digital signatures provide integrity and ______-
non repudiation
29
This person issues and revokes certificates
CA (certification authority)
30
Authenticates the certificate holder prior to certificate issuance Done within organization
ORA (organizational registration authorities)
31
certificates are revoked if a private key is compromised this list is maintained by the CA
CRL (certificate revocation list)
32
Client/server hybrid to check certificate expiration dates. A dynamic version of CRL
OCSP (online certification status protocol)
33
Chip promoted by the NSA to provide secured voice and data messages but had built in backdoor features. It used Skipjack
Clipper chip
34
Hash function using a key to provide authenticity and integriity
MAC (message authentication code)
35
Combines a shared key with hashing A preshared key is exchanged
HMAC (hashed message authentication code)
36
Set of protocols that provide a cryptographic layer to IP traffic Often used for VPNs
IPSEC
37
Part of IPSEC suite that provides authentication and integrity for each packet protects against replay attacks
AH (authentication header)
38
Part of IPSEC suite that provides confidentiality for each packet
ESP (encapsulation security payload)
39
Part of IPSEC suite. Simplex connection used to negotiate ESP and AH parameters
Security Association (SA)
40
Part of IPSEC suite that manages SA creation process and key exchange mechanics
ISAKMP (internet security and key management protocol)
41
IPSEC mode that encrypts and authenticates the entire package including the headers
Tunnel mode
42
IPSEC mode that encrypts and authenticates the payload
Transport mode
43
IPSEC mode that uses different types of encryption and hashes and selects the fastest and most secure pair
44
Uses a web of trust model to authenticate digital certificates (if you trust me, you trust everyone i trust)
Pretty Good Privacy (PGP)
45
Provides a standard way to format email Not secure
MIME (multipurpose internet mail extensions)
46
Uses PKI to encrypt and authenticate MIME encoded email
S/MIME (Secure/MIME)