Chapter 6
Applied Cryptography
Lab Exercises
6.01 Apple vs. the FBI
6.02 Australia’s Assistance and Access Bill
6.03 To Serve Man
6.04 E-mail Cryptography
Lab Analysis
Key Term Quiz
It’s important to take what you’ve learned about cryptography so far and apply it to real-world cases. In this chapter, you’ll analyze what are arguably the two most controversial and prominent cases regarding cryptography in recent times.
First, you’ll take a look at the dispute that started in February 2016 between the Federal Bureau of Investigation (FBI) and Apple Inc. The FBI wanted Apple to unlock an iPhone belonging to a terrorist from the December 2, 2015, attack in San Bernardino, California, by writing software that would undermine the security ...
Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.