Term
|
Definition
Known plaintext; Adaptive plaintext; Chosen plaintext; Chosen cipher; Ciphertext-only; Replay; Rubber hose; Trickery and Deceit; Frequency Analysis; Brute force attack; Meet-in-the-Middle; Inference attack; Bit Flipping
mneumonic: Kinky, affectionate caterpillars cavort clean responsible red fruits because morals infect behavior.
(kookie, but it works) |
|
|
Term
|
Definition
Hacker has both plaintext and corresponding ciphertext messages-the more, the better. The plaintext copies are scanned for repeatable sequences, which are then compared to the ciphertext versions. Over time and with effort, this can be used to decipher the key. |
|
|
Term
|
Definition
Cryptography attack; a variant of known plaintext, where the attacker encrypts multiple plaintext copies himself in order to gain the key. |
|
|
Term
|
Definition
Cryptography attack; the hacker obtains multiple ciphertexts. Statistical analysis can then be used to reveal, eventually repeating code, which can be used to decode messages later on. |
|
|
Term
|
Definition
Cryptography attack; a form of ciphertext-only attack but only for portions of gained ciphertext. |
|
|
Term
|
Definition
Cryptography attack; the attacker has access to the TPM but cannot extract the encryption key from it. He then uses this attack. |
|
|
Term
|
Definition
Cryptography attack; most often performed in the context of a man-in-the-middle attack. The hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel. A defense is use of session-tokens. |
|
|
Term
|
Definition
Cryptography attack; use of torture to obtain the key. |
|
|
Term
|
Definition
Cryptography attack; the use of social engineering to obtain the key. |
|
|
Term
|
Definition
Cryptography attack; letters and letter combinations recur at specific rates in language. That information is used to crack the cipher. |
|
|
Term
|
Definition
Cryptography attack; practice of trying every possible combination to break an encryption code. |
|
|
Term
|
Definition
Cryptography attack; breaks cipher into two parts; used for forging signatures on mixed-type digital signature schemes. “Encrypts from one end and decrypts from the other end”. |
|
|
Term
|
Definition
Derive information from the ciphertext without actually decoding it. For example, if you are monitoring the encrypted line a shipping company uses and the traffic suddenly increases, you can assume the company is getting ready for a big delivery. |
|
|
Term
|
Definition
An integrity attack where ciphertext is manipulated to generate a predictable outcome in the plaintext once it is decrypted. In this attack, the attacker isn't interested in learning the entirety of the plaintext message. |
|
|