80. Cryptographic Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Cryptographic Attacks

Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data

2
New cards

Downgrade Attacks

Aims to force a system into using a weaker or older cryptographic standard or protocol than what it is currently using

3
New cards

Collision Attacks

Aims to fien two different inputs that produce the same hash output

4
New cards

Quantum Computing

A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers

5
New cards

POODLE Attack

Padding Oracle On Downgraded Legacy Encryption attack, which targeted SSL version 3.0

6
New cards

Birthday Paradox

In a group of just 23 people, there’s a more than 50/50 chance that two of them share the same birthday

7
New cards

Quantum Communication

A communications network that relies on qubits made of photons to send multiple combinations of ones and zeroes simultaneously which results in tamper resistant and extremely fast communications

8
New cards

Qubit

A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeros at the same time through superposition

9
New cards

Post-quantum Cryptography

New kind of cryptographic algorithm that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers