-
What ports are secure in your computer?
Read more: What ports are secure in your computer?In information security, we consider secure ports those that encrypt the communication, or all the data that passes through them. But, you need to be aware that this does not mean that they cannot be successfully attacked by a hacker. There are many different security attacks that can be carried out even if the communication…
-
What are insecure ports in your computer?
Read more: What are insecure ports in your computer?Informally, insecure ports are ports that do not encrypt the communication that occurs through that port. Ports in a computer are a virtual place where network connections start and end. The ports are virtual as they are software created and managed by your operating system. This means you can configure them from your operating system.…
-
MD5 length extension attack in Python
Read more: MD5 length extension attack in PythonThe length extension attack exploits the fact that the hash value created with the Merkle-Damgård construction represents the internal state of the Initial Vector at the end of the execution. This means that you can use the hash value to set up the internal state (the modified values of the Initial Vector) and keep processing…
-
What is the birthday paradox and how we can use it in cryptography?
Read more: What is the birthday paradox and how we can use it in cryptography?The birthday paradox is the result of solving the birthday problem. The birthday problem is as follows: What is the probability that in a random set of n people, two people share the same birthday? Another way we can state this problem is: What is the minimum k number of people such that the probability…
-
Masquerade attack
Read more: Masquerade attackWhat is a masquerade attack in network security? A masquerade is an attack where the attacker pretends to be someone else to gain unauthorized access to information or services. This attack is classified as an active attack. Also, it usually includes another type of active attack, like a man-in-the-middle attack, modification of messages, etc.…
-
What is a security attack (with examples)?
Read more: What is a security attack (with examples)?A security attack is an activity or act made upon a system with the goal to obtain unauthorized access to information or resources. It is usually carried out by evading security policies that are in place in organizations or individual devices. Two definitions provided by RFC 4949 are: An intentional act by which an entity…
-
What is the Man-In-The-Middle attack?
Read more: What is the Man-In-The-Middle attack?Man-In-The-Middle (MITM) attack is one of many approaches that attackers or hackers use to steal or get unauthorized access to information. The MITM attack is a well-known attack where an attacker intercepts the information transmitted in a communication. At that point, the attacker can just resend the same information or modify it and re-send it.…
-
What is a Replay Attack in Cryptography?
Read more: What is a Replay Attack in Cryptography?Cryptographic algorithms are susceptible to different attacks. One of such attacks is a Replay Attack. This attack consists in the following: Capture the data that is transmitted. Re-send the data that was captured, no need to modify before resending it. Produce an unauthorized action. From the description above, you can see that the attacker does…