Chapter 6

Applied Cryptography

Lab Exercises

6.01   Apple vs. the FBI

6.02   Australia’s Assistance and Access Bill

6.03   To Serve Man

6.04   E-mail Cryptography

Lab Analysis

Key Term Quiz

It’s important to take what you’ve learned about cryptography so far and apply it to real-world cases. In this chapter, you’ll analyze what are arguably the two most controversial and prominent cases regarding cryptography in recent times.

First, you’ll take a look at the dispute that started in February 2016 between the Federal Bureau of Investigation (FBI) and Apple Inc. The FBI wanted Apple to unlock an iPhone belonging to a terrorist from the December 2, 2015, attack in San Bernardino, California, by writing software that would undermine the security ...

Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.