๐Ÿ“ยง Cryptography

Algorithms:

  • Encryption:

  • Message Authentication Code (MAC)

    • HMAC โ€” Hash-based Message Authentication Code

    • GMAC โ€” Message Authentication Code using Galois/Counter Mode

  • Key Derivation Function (KDF)

    • HKDF โ€” HMAC-based Key Derivation Function

Attacks:

  • Length extension attack โ€” an attack on hashing function that allows computing a valid hash for a longer message without knowing the message itself.

  • TLS CBC IV attack โ€” an attack on CBC cipher when ciphertext of the previous block is reused as IV of the next block.

  • Replay attack

Backlinks