Please enable JavaScript.
Coggle requires JavaScript to display documents.
5 - Cryptographic Attacks - Coggle Diagram
5 - Cryptographic Attacks
Brute-force attacks
Try every possible valid combination for a key
Rainbow tables provide precomputed values for cryptographic hashes
Cryptographic salt
Random value that is added to the end of the password before the OS hashes the password and stored in the password file along with the hash.
Specialized password hashing functions
Password-Based Key Derivation Function 2 (PBKDF2)
bcrypt
scrypt
Key-stretching
Repeatedly hashing a password with a salt and many iterations to make brute-force and dictionary attacks slower and more computationally expensive for attackers
Analytic attack
Algebraic manipulation that attempts to reduce the complexity of the algorithm
Implementation attack
Try to exploit a weakness in the implementation of a cryptographic system
Statistical attack
Exploit statistical weaknesses in a cryptosystem
Fault-injection attack
Attempt to compromise the integrity of a cryptographic device by causing some type of external fault (e.g. high-voltage electricity, high or low temperature)
Side-Channel attack
Seek to use information (e.g. changes in processor utilization, electricity consumption, electromagnetic radiation) to monitor system activity and retrieve information that is actively being encrypted
Timing attack
Type of side-channel attack where the attacker measures precisely how long cryptographic operations take to complete, gaining information about the cryptographic process
Frequency analysis and the ciphertext-only attack
Compare letters in the ciphertext and the statistics of the letters based on the used langauge
Known Plaintext Attack
Chosen Plaintext Attack
Chosen Ciphertext Attack
Meet-in-the-Middle attacks
Reason of removal of 2DES
Man-in-the-Middle (MitM) attacks
Birthday attack
Collision attack
Replay Attack