Cryptographic Attacks
Cryptographic attacks → attacks where an adversary attempts to access encrypted data by exploiting weaknesses in algorithms, implementations, or configurations without possessing the correct decryption keys.
Hash Collision
Hash collision → also known as a birthday attack, technique where two different inputs are crafted to produce the same hash value, undermining integrity and trust in the hashing algorithm.
Downgrade Attack
Downgrade attack → attack that forces systems to fall back to weaker security settings or older protocols, making encryption easier to break or bypass.
SSL Stripping
Secure sockets layer stripping (SSL stripping) → downgrade attack combined with an on-path attack where encrypted hypertext transfer protocol secure connections are downgraded to unencrypted hypertext transfer protocol without the user noticing.
In The Clear
In the clear → state where data is transmitted or stored without encryption, making it readable and vulnerable to interception or exposure.
Hashing a Password
Hashing a password → process of converting a password into a fixed-length hash value so the original password is not stored, improving security if the database is compromised.
Spraying Attack
Password spraying attack → authentication attack that attempts a small number of common passwords across many accounts to avoid account lockouts and detection.
Brute Force Attack
Brute force attack → attack that systematically tries every possible password or key combination until the correct one is found, relying on computational power rather than finesse.