Cryptographic attacks (2.4)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Cryptography

You’ve encrypted data and sent it to another person

2
New cards

Cryptographic attack

Since an attacker doesn’t have the key to unlock the cryptography, they attack it head on and try to break it

3
New cards

Birthday attack

Attacker is trying to find two different inputs that produce the same hash value, to get through the cryptography

4
New cards

How do you prevent a birthday attack?

By using a very large output size

5
New cards

Downgrade attack

Uses a perfectly secure algorithm but the implementation of the algorithm creates the attack

6
New cards

What’s the purpose of a downgrade attack?

For the 2 devices that’s trying to send encrypted data to use a weaker encrypted algorithm or not use any encryption at all

7
New cards

SSL stripping

A form of a downgrade attack that combines an on path attack with a downgrade attack

8
New cards

how does SSL stripping work?

An attacker is sitting in the middle of a conversation and that can allow them to perform a downgrade attack. Making the info they take non encrypted when sent back to them

9
New cards

What is the difference between HTTP and HTTPS?

HTTP is not encrypted at all while HTTPS is more secure and encrypted

10
New cards