Domain 3: Cryptography Attacks and Implementing Flashcards
(34 cards)
Algebraic manipulation that attempts to reduce the complexity of the algorithm
Analytic Attack
Attack that focus on the exploiting of the software code of cryptography system
Implementation Attack
Attack that attempts to find the vulnerability in the hardware or OS hosting the cryptography application
Statistical Attack
Attack that involves massive processing power to methodically guess the key used to secure cryptographic communications
Brute-Force Attack
Attacker has a copy of the message in both encrypted and plaintext format from here he can derive the key that was used
Known Plaintext Attack
Attacker has the ability to encrypt plaintext messages of their choosing and can then analyze the ciphertext output of the encryption algorithm
Chosen Plaintext Attack
- Cryptanalyst has the ability to decrypt chosen portions of ciphertext message and use the decrypted portion of the message to discover the key
- Mirrors plaintext attacks
- Usually used against asymmetric cryptosystems
Chosen Ciphertext Attacks
Attacker seeks to substitute in a digitally signed communication with a different message that produces the same message digest, thereby maintaining the validity of the original digital signature
Birthday attack
Cryptanalyst knows something about the key and uses this knowledge to attack
Known Key Attack
Seeks to find the difference between related plaintexts that are encrypted
Differential Cryptanalysis
- Cryptanalyst finds a large amount of plaintext/ciphertext pairs created with the same key
- The pairs are studied to derive information about the key used to create them
Linear Cryptanalysis
- Uses physical data to break a cryptosystem
- i.e. monitoring CPU cycles or power consumption used while encrypting and decrypting
Side-Channel Attacks
- Authenticates identity of the signer and proof of document’s integrity
- Provides nonrepudiation
Digital Signatures
Public key signed with a digital signature
Digital Certificate
Organization registration authority that authenticates the identity of a certificate holder before issuing a certificate to them
Certificate Authorities (CAs)
When obtaining a digital certificate you must first prove your identity to the CA. This process is called…
Enrollment
List of revoked certificates
Certificate Revocation Lists (CRL)
Replacements for Certificate Revocation Lists (CRL) and uses client-server design that scales better
Online Certificate Status Protocol (OCSP)
- Software that uses encryption to enforce copyright restrictions on digital media
- i.e. Music, movies, e-book, video games, and documents
Digital Rights Management (DRM)
- IPSec protocol
- Acts as a digital signature for data
- Protects against replay attacks
- Provides no confidentiality
Authentication Header (AH)
- IPSec protocol
- Encrypted packet data
Encapsulating Security Payload (ESP)
- IPSec protocol
- One-way connection used to negotiate ESP or AH parameters
Security Association (SA)
- IPSec protocol
- Manages the SA creation process
Internet Security Association and Key Management Protocol (ISAKMP)
- IPSec protocol
- Encrypts the entire packet, including original packet headers
ESP Tunnel Mode