1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cryptographic Attacks
Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data
Downgrade Attacks
Aims to force a system into using a weaker or older cryptographic standard or protocol than what it is currently using
Collision Attacks
Aims to fien two different inputs that produce the same hash output
Quantum Computing
A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers
POODLE Attack
Padding Oracle On Downgraded Legacy Encryption attack, which targeted SSL version 3.0
Birthday Paradox
In a group of just 23 people, there’s a more than 50/50 chance that two of them share the same birthday
Quantum Communication
A communications network that relies on qubits made of photons to send multiple combinations of ones and zeroes simultaneously which results in tamper resistant and extremely fast communications
Qubit
A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeros at the same time through superposition
Post-quantum Cryptography
New kind of cryptographic algorithm that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers