From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Three cryptanalytic attack categories
From the course: Ethical Hacking: Cryptography
Three cryptanalytic attack categories
- [Instructor] Next, we'll review three categories of cryptanalytic attacks. I must put a disclaimer here to warn you that as you study a plethora of attacks, which continue to grow exponentially, you'll see the model are classified in different ways. For ease of learning, I'll be using three broad categories, technical, side channel, and social engineering, as I found it easier to understand them by aligning these cryptanalytic attacks to their targets. Technical attacks target the algorithm itself. Side channel attacks target the implementation. We must think broadly to identify the many points of vulnerability in a crypto system as we analyze these first two categories. What we've discussed so far has mainly focused on choosing a strong algorithm, but we must still integrate it into real technology, and many things could go wrong, such as instructions not being followed correctly. Finally, the last category of social engineering attacks, often thought of as the most powerful and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.