Methods of Attack

Detail common methods of attacking encryption including general and specific attacks.

As discussed, there are various encryption techniques that can be used to protect your information. But how do you know that the encryption techniques are robust and really doing what they say they are doing? How do you know that there are not hidden backdoors in the program that someone can use to extract information?

The simple answer is that we do not know how robust a given technique is when it is initially developed. When it comes to encryption, there is no mathematical proof that can be performed that will tell you an encryption scheme is secure. The only way to know the strength of an encryption scheme is to let the world examine it ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.