Cryptographic Attacks Flashcards

(9 cards)

1
Q

What is a Cryptographic Attack?

A
  • Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, and authenticity of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Downgrade Attack

A
  • Aims to force a system into using a weaker or older cryptographic standard or protocol than what it’s currently utilizing
  1. Two systems (like your browser and a server) begin negotiating which encryption protocol to use
  2. The attacker intercepts this negotiation process
  3. The attacker modifies the messages to make it appear that one or both parties only support older, weaker encryption
  4. Both parties then “agree” to use the weaker protocol, thinking it’s the best they both support

5.The attacker can now more easily break the weaker encryption and intercept or modify the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are downgrade attacks so dangerous?

A
  • They turn the very nature of evolving security, such as the development of stronger, more robust cryptographic protocols, against itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Collision Attack

A
  • Aims to find two different inputs that produce the same hash output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the core concept of the “Birthday paradox” or “Birthday Attack”?

A
  • In a group of just 23 people, theres a better than even chance that two of them share the same birthday
  • Thus, The probability that two distinct inputs, when processed through a hashing function, will produce the same output, or a collision
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is quantum computing?

A
  • A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Instead of using “1’s” and “0’s” like traditional computers, what do quantum computers use?

A
  • Quantum bits, or qubits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quantum Communication

A
  • A communications network that relies on qubits made of photons (another word for light) to send multiple combinations of ones and zeros simultaneously which results in tamper resistant and extremley fast communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Qubit

A
  • A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeroes at the same time through superposition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly