Shared Flashcard Set

Details

CEH Certified Ethical Hacker 312-50:Crypt attacks
CEH Certified Ethical Hacker 312-50:Crypt attacks
14
Computer Science
Professional
02/04/2014

Additional Computer Science Flashcards

 


 

Cards

Term

KACCCRRFBMIB

 

Definition

Known plaintext; Adaptive plaintext; Chosen plaintext; Chosen cipher; Ciphertext-only; Replay; Rubber hose; Trickery and Deceit; Frequency Analysis; Brute force attack; Meet-in-the-Middle; Inference attack; Bit Flipping

 

mneumonic: Kinky, affectionate caterpillars cavort clean responsible red fruits because morals infect behavior.

(kookie, but it works)

Term
Known plaintext
Definition
Hacker has both plaintext and corresponding ciphertext messages-the more, the better. The plaintext copies are scanned for repeatable sequences, which are then compared to the ciphertext versions. Over time and with effort, this can be used to decipher the key.
Term
Chosen plaintext
Definition
Cryptography attack; a variant of known plaintext, where the attacker encrypts multiple plaintext copies himself in order to gain the key.
Term
Ciphertext-only
Definition
Cryptography attack; the hacker obtains multiple ciphertexts. Statistical analysis can then be used to reveal, eventually repeating code, which can be used to decode messages later on.
Term
Chosen cipher
Definition
Cryptography attack; a form of ciphertext-only attack but only for portions of gained ciphertext.
Term
Adaptive plaintext
Definition
Cryptography attack; the attacker has access to the TPM but cannot extract the encryption key from it. He then uses this attack.
Term
Replay attack
Definition
Cryptography attack; most often performed in the context of a man-in-the-middle attack. The hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel. A defense is use of session-tokens.
Term
Rubber hose
Definition
Cryptography attack; use of torture to obtain the key.
Term
Trickery and Deceit
Definition
Cryptography attack; the use of social engineering to obtain the key.
Term
Frequency Analysis
Definition
Cryptography attack; letters and letter combinations recur at specific rates in language. That information is used to crack the cipher.
Term
Brute force attack
Definition
Cryptography attack; practice of trying every possible combination to break an encryption code.
Term
Meet-in-the-Middle
Definition
Cryptography attack; breaks cipher into two parts; used for forging signatures on mixed-type digital signature schemes. “Encrypts from one end and decrypts from the other end”.
Term
Inference attack
Definition
Derive information from the ciphertext without actually decoding it. For example, if you are monitoring the encrypted line a shipping company uses and the traffic suddenly increases,
you can assume the company is getting ready for a big delivery.
Term
Bit Flipping
Definition
An integrity attack where ciphertext is manipulated to generate a predictable outcome in the plaintext once it is decrypted. In this attack, the attacker isn't interested in learning the entirety of the plaintext message.
Supporting users have an ad free experience!