This is a type of brute force attack in which a list of words and phrases are used to ‘guess’ the key
dictionary
2
New cards
To mitigate this type of attack, use long and uncommon passwords.
dictionary
3
New cards
This type of attack tries to find two inputs that produce the same hash value. Then the hash would be attached to two documents. One sent to user1 to get their signature. The signature would be duplicated to document 2 and sent to user2.
collision attack
4
New cards
To mitigate these types of attack, use longer hash outputs.
collision attack birthday attack
5
New cards
This type of attack combines collision and brute force attacks
birthday attack
6
New cards
This type of attack forces a system to use older, less secure communication protocols
downgrade attack
7
New cards
To mitigate this type of attack, set up servers to not support older versions and less secure protocols