2.4 Cryptographic Attacks Flashcards

(5 cards)

1
Q

Cryptographic attacks

A
  • You’ve encrypted data and sent it to another person– Is it really secure?– How do you know?
  • The attacker doesn’t have the combination (the key)– So they break the safe (the cryptography)
  • Finding ways to undo the security– There are many potential cryptographic shortcomings– The problem is often the implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Birthday attack

A
  • In a classroom of 23 students, what is the chance of
    two students sharing a birthday?– About 50%– For a class of 30, the chance is about 70%
  • In the digital world, this is a hash collision– A hash collision is the same hash value for two
    different plaintexts– Find a collision through brute force
  • The attacker will generate multiple versions of plaintext
    to match the hashes– Protect yourself with a large hash output size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collisions

A
  • Hash digests are supposed to be unique– Different input data should not create the same hash
  • MD5 hash– Message Digest Algorithm 5– First published in April 1992– Collisions identified in 1996
  • December 2008: Researchers created CA certificate
    that appeared legitimate when MD5 is checked– Built other certificates that appeared to be
    legit and issued by RapidSSL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Downgrade attack

A
  • Instead of using perfectly good encryption, use
    something that’s not so great– Force the systems to downgrade their security
  • 2014 - TLS vulnerability POODLE (Padding Oracle
    On Downgraded Legacy Encryption)– On-path attack– Forces clients to fallback to SSL 3.0– SSL 3.0 has significant cryptographic vulnerabilities– Because of POODLE, modern browsers won’t
    fall back to SSL 3.0
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL Stripping (see video and notes example)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly