Category: Attacks

  • What is the length extension attack?

    The length extension attack exploits the fact that the hash value created with the Merkle-Damgård construction represents the internal state of the Initial Vector at the end of the execution. This means that you can use the hash value to set up the internal state (the modified values of the Initial Vector) and keep processing […]

    Read more
  • What is the birthday paradox and how we can use it in cryptography?

    The birthday paradox is the result of solving the birthday problem. The birthday problem is as follows: What is the probability that in a random set of n people, two people share the same birthday? Another way we can state this problem is: What is the minimum k number of people such that the probability […]

    Read more
  • Masquerade attack

      What is a masquerade attack in network security? A masquerade is an attack where the attacker pretends to be someone else to gain unauthorized access to information or services. This attack is classified as an active attack. Also, it usually includes another type of active attack, like a man-in-the-middle attack, modification of messages, etc. […]

    Read more
  • What is a security attack (with examples)?

    A security attack is an activity or act made upon a system with the goal to obtain unauthorized access to information or resources. It is usually carried out by evading security policies that are in place in organizations or individual devices. Two definitions provided by RFC 4949 are:  An intentional act by which an entity […]

    Read more
  • What is the Man-In-The-Middle attack?

    Man-In-The-Middle (MITM) attack is one of many approaches that attackers or hackers use to steal or get unauthorized access to information. The MITM attack is a well-known attack where an attacker intercepts the information transmitted in a communication. At that point, the attacker can just resend the same information or modify it and re-send it. […]

    Read more
  • What is a Replay Attack in Cryptography?

    Cryptographic algorithms are susceptible to different attacks. One of such attacks is a Replay Attack. This attack consists in the following: Capture the data that is transmitted. Re-send the data that was captured, no need to modify before resending it. Produce an unauthorized action. From the description above, you can see that the attacker does […]

    Read more