Domain 3: Cryptography Attacks and Implementing Flashcards

(34 cards)

1
Q

Algebraic manipulation that attempts to reduce the complexity of the algorithm

A

Analytic Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack that focus on the exploiting of the software code of cryptography system

A

Implementation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack that attempts to find the vulnerability in the hardware or OS hosting the cryptography application

A

Statistical Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack that involves massive processing power to methodically guess the key used to secure cryptographic communications

A

Brute-Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker has a copy of the message in both encrypted and plaintext format from here he can derive the key that was used

A

Known Plaintext Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker has the ability to encrypt plaintext messages of their choosing and can then analyze the ciphertext output of the encryption algorithm

A

Chosen Plaintext Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Cryptanalyst has the ability to decrypt chosen portions of ciphertext message and use the decrypted portion of the message to discover the key
  • Mirrors plaintext attacks
  • Usually used against asymmetric cryptosystems
A

Chosen Ciphertext Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacker seeks to substitute in a digitally signed communication with a different message that produces the same message digest, thereby maintaining the validity of the original digital signature

A

Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptanalyst knows something about the key and uses this knowledge to attack

A

Known Key Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Seeks to find the difference between related plaintexts that are encrypted

A

Differential Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Cryptanalyst finds a large amount of plaintext/ciphertext pairs created with the same key
  • The pairs are studied to derive information about the key used to create them
A

Linear Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Uses physical data to break a cryptosystem

- i.e. monitoring CPU cycles or power consumption used while encrypting and decrypting

A

Side-Channel Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Authenticates identity of the signer and proof of document’s integrity
  • Provides nonrepudiation
A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key signed with a digital signature

A

Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organization registration authority that authenticates the identity of a certificate holder before issuing a certificate to them

A

Certificate Authorities (CAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When obtaining a digital certificate you must first prove your identity to the CA. This process is called…

17
Q

List of revoked certificates

A

Certificate Revocation Lists (CRL)

18
Q

Replacements for Certificate Revocation Lists (CRL) and uses client-server design that scales better

A

Online Certificate Status Protocol (OCSP)

19
Q
  • Software that uses encryption to enforce copyright restrictions on digital media
  • i.e. Music, movies, e-book, video games, and documents
A

Digital Rights Management (DRM)

20
Q
  • IPSec protocol
  • Acts as a digital signature for data
  • Protects against replay attacks
  • Provides no confidentiality
A

Authentication Header (AH)

21
Q
  • IPSec protocol

- Encrypted packet data

A

Encapsulating Security Payload (ESP)

22
Q
  • IPSec protocol

- One-way connection used to negotiate ESP or AH parameters

A

Security Association (SA)

23
Q
  • IPSec protocol

- Manages the SA creation process

A

Internet Security Association and Key Management Protocol (ISAKMP)

24
Q
  • IPSec protocol

- Encrypts the entire packet, including original packet headers

A

ESP Tunnel Mode

25
- IPSec protocol | - Only encrypts the data, not the original headers
ESP Transport Mode
26
- IPSec protocol - Negotiates the algorithm selection process - Both sides of the IPSec tunnel will typically use IKE to negotiate the highest and fastest level of security (i.e. selecting AES over single DES)
IKE
27
- Asymmetric encryption - Used to encrypt emails, documents, or disk drives - Used web of trust model to authenticate digital certificates instead of a central CA
Pretty Good Privacy (PGP)
28
- Asymmetric encryption | - Leverages PKI to encrypt and authenticate MIME-encoded email
S/MIME (Secure MIME)
29
- Third-party organization holds copy of public/private key pair - Failsafe that allows access to sensitive data when the need arises
Escrowed Encryption
30
- The examination of repetition of characters in a given encrypted message - Repeating patterns may indicate the type of cipher being used i.e. substitution or transposition
Frequency analysis
31
Exploits cryptographic protocols that use two rounds of encryption
Meet-in-the-middle attack
32
Procedure to digitally sign a message
1. Use a hash function to generate a message digest | Then encrypt the digest with your private key
33
Procedure to verify the digital signature on a message
1. Decrypt the signature with the sender’s public key and then compare the message digest to the one you generate yourself 2. If they match the message is authentic
34
- NIST standard created to specify the digital signature algorithms acceptable for Federal Gov use - Requires that SHA-3 hashing function be used for all digital signatures - Allowed encryption algorithms include: 1. Digital Signature Algorithm (DSA) 2. Rivest, Shamir, Adleman (RSA) 3. Elliptic Curve DSA (ECDSA)
Digital Signature Standard (DSS)