Time
12 hours 41 minutes
Difficulty
Advanced
CEU/CPE
13

Video Description

This lesson covers attacks on cryptography. Types of attacks on cryptography include: • Ciphertext Only • Known Plain Text • Chosen Plain Text • Chosen ciphertext

Video Transcription

00:04
All right now we've talked about earlier. The fact that anything that's encrypted could ultimately be decrypted. It's just a matter of time. It's a matter of work factor, which means the processing capabilities and the amount of effort you're essentially willing to put into it. And, you know,
00:21
generally speaking, if it's gonna take you 10 million years with 10,000 processors running 24 7 that's probably okay if I'm just sending you my grocery list. So the idea is, it's all about the work factor. But as an attacker, I keep trying to chip away, chip away, chip away
00:38
and what we're talking about with the attacks here on this particular slides.
00:41
Um, the idea is you're using. Perhaps a proprietary algorithm went, for instance, the government uses, you know, you're not necessarily using A S or more standards based. So when we talk about attacks on cryptography, sometimes it is about decrypting encrypted text. But other times it's it's bigger than that.
01:00
Let me break the algorithm because if I break the algorithm than I can decrypt anything
01:06
encrypted that out right, it's about finding out the key and being able to ridiculously, predictably generate the key. So
01:14
these particular cats, for instance, cipher text only attack. Um, this is the most commonly performed attack. It's also the least likely to be successful. So what this essentially means is I have gotten a sniffer, some device on your network, and I've captured
01:30
encrypted text. So you guys are transmitting an encrypted text. I've captured some. All I have is cipher text. I don't have
01:38
anything else. I don't have any other clues. So what I generally have to do is just kind of brute force it And that takes a tremendous amount of time, tremendous amount of processing capabilities and probably not may be very successful.
01:51
Where I have a better chance of being successful is to be ableto look a text in plain text and compare it to that in cipher text. And the more I can see in plain text in the more in cipher text, the better able I am to figure out patterns doesn't mean it's gonna be easy, but that's a step in the right direction.
02:09
So when we come to the known plain text attack,
02:13
I have captured something inside for tests on the network. I haven't psycho text and there is a portion of that that I also know in plain text. I don't get to choose what I do in flame text. But like, for instance, your automatic signature Very respectfully yours, Kelly hander hand.
02:29
You know, if I always signed my email messages the same way and you've captured an email message, will, you know, somewhere in there is very respectfully yours, Kelly Handwritten.
02:38
Okay, so that's a known plain text attack.
02:42
A chosen plain text attack is even better for me is an attacker. Because I get to see what I want in plain text and encrypted. And the way that works is I'm gonna be the creator of the message.
02:54
Okay? I'm gonna create this message. I'm gonna be very purposeful and careful about patterns that I use words that I choose repetitions.
03:04
And I'm gonna craft this message exactly the way I want it, and then I'm gonna send it to you.
03:08
Okay? I'm gonna say, Hey, send this out to all your team. But remember, it's important. So encrypted
03:14
now, the message came from May. So I have it in plain text and then I captured on the network. I have it in cipher text. So obviously this is much bigger than me. Just being able to read a message. I want to find out what your encryption algorithm does. What is the key due to confer this plain text to this cipher text? Because that will help me
03:32
in a much larger scheme of things.
03:35
And then the last attack on this slide chosen cipher text. That means I can see anything I want in plain text and anything I want. In cipher text. I have gained access to more system, and it's sometimes called a lunchtime or a midnight attack. What that means is you've wandered off from your work station.
03:54
I've gained access to it. Now I can see what I want.
03:58
Another attack on cryptography, and I think this one actually might be testable. It's called a meet in the middle attack, not a man in the middle attack, but a meet in the middle attack. And this isn't a tack gear to algorithms like triple does where they're multiple keys.
04:14
So, for instance, we we see encryption key one, then key tooth. And with key three
04:18
Okay, that's the way triple Dez works. Well, let me figure out the difference between what things look with encrypted with key one, and then how they look encrypted with key to And by comparing and contrasting the differences, that gives me an idea what the key is in what each he does individual.
04:36
All right, so that's called meet in the middle attacks, you know, other attacks. What? We didn't Really I don't really have an undecided but a man in the middle attack we talked about, someone steps in and actually, really, a man in the middle of that can be totally passive. Passive men in middle attack is sniffing the network right
04:56
on intercepting traffic. And I'm looking at it. But I'm not modifying.
04:59
A man in the middle of that becomes active once I start injecting myself into the stream like, for instance, a session hijack attack. So I present myself his Bank of America. I steal your session, it's session information and try to resume communications.
05:17
Ah, as Bank of America
05:19
to get information, passwords, whatever that might be. So that's a session. Hijack. Um,
05:27
man in the middle's are passive by nature, but they can be active. And when they're escalated to a man in the middle Ah, a session hijack. Hopefully that makes sense.

Up Next

ISC2 CISSP

Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor