CISSP Domain 3 > Cryptographic Attacks > Flashcards
What is exploited by Meet-in-the-middle attacks?
protocols that use two rounds of encryption (e.g. 2DES)
What is the goal of a Birthday attack?
finding collisions in hash functions
What is the goal of a Replay attack?
reusing authentication requests