Chapter 10: Protecting Cryptographic Techniques

Encryption and hashing algorithms, along with cryptographic tools and techniques, are designed to enhance the security of our data and systems. As with many other things, there is always the threat that someone can disrupt this security. This can occur if a malicious actor launches an attack on the very methods designed to protect us. In this chapter, we'll learn that it's essential to protect our cryptographic techniques, given that there are many threats that exist today.

First, we'll take a look at a number of attacks, including brute-force and password attacks, all designed to alter the integrity of our data or a system. We'll also see how there are tools readily available for the malicious ...

Get Modern Cryptography for Cybersecurity Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.