Chapter 10: Understanding cryptography and PKI

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

How to verify integrity

Hashing

2
New cards

Hashing algorithms

MD5

SHA 0 , 1 , 2, 3

3
New cards

What hashing algorithm is used for passwords

SHA-3

4
New cards

Hash collision

Hashing algorithms create same hash for different inputs

5
New cards

Password attacks

attempts to discover password for authentication.

6
New cards

Brute force attacks and dictionary attacks

Attempts to guess every possible combination of words.

thwarted by complexity of passwords

7
New cards

Password spraying

Brute force attack to avoid being locked out due to it attacking multiple users across time intervals

8
New cards