Encryption Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

Frequency Analysis

Involves looking at the blocks of an encrypted message to determine if any common patterns exist

2
New cards

Known plain text

Relies on the attacker having pairs of known plain text along with the corresponding ciphertext. This gives the attacker a place to start attempting to derive the key

3
New cards

Chosen plain text

The attacker obtains the ciphertexts corresponding to a set of plain texts of their own choosing. This allows the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key

4
New cards

Related key attack

This is like a chosen plain-text attack, except the attacker can obtain ciphertexts encrypted under two different keys

5
New cards

Birthday Attack

is a cryptographic attack that uses probability theory, specifically the birthday problem, to find hash collisions. It exploits the high probability that two different inputs will produce the same hash value, similar to how in a group of 23 people, there's a 50% chance that two will share the same birthday

6
New cards

Downgrade attack

Used against secure communications such as TLS in an attempt to get the user or system to inadvertently shift to less secure cryptographic modes. The idea is to trick the user into shifting to a less secure version of the protocol