From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Three cryptanalytic attack categories

Three cryptanalytic attack categories

From the course: Ethical Hacking: Cryptography

Three cryptanalytic attack categories

- [Instructor] Next, we'll review three categories of cryptanalytic attacks. I must put a disclaimer here to warn you that as you study a plethora of attacks, which continue to grow exponentially, you'll see the model are classified in different ways. For ease of learning, I'll be using three broad categories, technical, side channel, and social engineering, as I found it easier to understand them by aligning these cryptanalytic attacks to their targets. Technical attacks target the algorithm itself. Side channel attacks target the implementation. We must think broadly to identify the many points of vulnerability in a crypto system as we analyze these first two categories. What we've discussed so far has mainly focused on choosing a strong algorithm, but we must still integrate it into real technology, and many things could go wrong, such as instructions not being followed correctly. Finally, the last category of social engineering attacks, often thought of as the most powerful and…

Contents