课程: Ethical Hacking: Cryptography
今天就学习课程吧!
今天就开通帐号,24,700 门业界名师课程任您挑!
Three cryptanalytic attack categories
- [Instructor] Next, we'll review three categories of cryptanalytic attacks. I must put a disclaimer here to warn you that as you study a plethora of attacks, which continue to grow exponentially, you'll see the model are classified in different ways. For ease of learning, I'll be using three broad categories, technical, side channel, and social engineering, as I found it easier to understand them by aligning these cryptanalytic attacks to their targets. Technical attacks target the algorithm itself. Side channel attacks target the implementation. We must think broadly to identify the many points of vulnerability in a crypto system as we analyze these first two categories. What we've discussed so far has mainly focused on choosing a strong algorithm, but we must still integrate it into real technology, and many things could go wrong, such as instructions not being followed correctly. Finally, the last category of social engineering attacks, often thought of as the most powerful and…
随堂练习,边学边练
下载课堂讲义。学练结合,紧跟进度,轻松巩固知识。