19.2 Cryptography attacks
Module19 – Cryptography, Section 19.2 – Cryptography attacks A cryptographic attack is a method for circumventing the security of a cryptographic system by f...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'bursa deprem'.
About this video
Module19 – Cryptography, Section 19.2 – Cryptography attacks
A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme. This process is also called “Cryptanalysis".
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so; i.e., it is the study of how to crack encryption algorithms or their implementations.
Cryptography attacks
Known plaintext attacks (KPA)
Chosen plaintext attacks (CPA)
Ciphertext only attacks (COA)
Chosen ciphertext attacks (CCA)
Man-in-the-middle attacks (MITM)
Side channel attacks
Brute force attacks
Birthday attacks
Chosen Plaintext Attack (CPA)
Attacker has access to plain text and public key he wants to correlate and derive the private key
which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts
CPA is more powerful than KPA. Any cipher that prevents CPA is also secure against KPA and COA.
Known Plaintext Attack (KPA)
KPA is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).
These can be used to reveal secret keys information.
Ciphertext only Attack (COA)
– COA or known ciphertext attack is where the attacker has access to a set of ciphertexts only, however the attacker has some knowledge of the plaintext and work with ciphertext-only.
Chosen ciphertext Attack (CCA)
– In CCA model the attacker can gather secret key information by obtaining the decryptions of chosen ciphertexts.
Man-in-the-middle (MITM) attack
– An attacker is between Victim and Server. Attacker sits in between uses sniffer to watch the conversation to capture session/cookie.
Side-channel attack based on information gained from the physical implementation of a cryptosystem.
– For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited to break the system.
– Some side-channel attacks require technical knowledge of the internal operation of the system on which the cryptography is implemented.
A brute-force attack is a cryptanalytic attack is an attempt to decrypt any encrypted data
The attacker systematically checks all possible passwords and passphrases until the correct one is found using guessing and dictionary attack.
Brute-force attacks are an application of Brute-force search or exhaustive search which is problem-solving technique for systematically enumerating all possible candidates for the solution and checking each one.
Any weaknesses in an encryption system make the task easier.
Credential recycling is re-using username and password combinations gathered in previous brute-force attacks.
Pigeonhole principle
When 10 pigeons are put in 9 holes at least one hole has more than one pigeon.
The probability reaches 100% when the number of people reaches 366, However, 99.9% probability is reached with just 70 people.
Birthday problem is the probability of two out of some random people having the same birthday based on Pigeonhole principle.
Birthday attack is cryptographic attack uses the probability model to reduce the complexity of finding a collision for a hash function.
Exploits the mathematics behind the birthday problem in probability theory.
The attack depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations.
With a birthday attack, it is possible to find a collision of a hash function.
Video Information
Views
291
Total views since publication
Likes
1
User likes and reactions
Duration
6:21
Video length
Published
Nov 3, 2017
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cbtu #cbtuniversity #java #ethical hacking #hacker #sql injection #plaintext attack #ciphertext attack #cca #coa #cpa #crib #cryptanalysis #private key #public key #mitm #man in the middle #bruteforce #side channel #encrypt #pigeonhole #birthday attack #probablitiy #collision #hash function #key management #exchange key #sesson #cookie #password #passphrase #weakness #pki
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.