Chapter 6

Applied Cryptography

Lab Exercises

6.01   Apple vs. the FBI

6.02   Australia’s Assistance and Access Bill

6.03   To Serve Man

6.04   E-mail Cryptography

Lab Analysis

Key Term Quiz

It’s important to take what you’ve learned about cryptography so far and apply it to real-world cases. In this chapter, you’ll analyze what are arguably the two most controversial and prominent cases regarding cryptography in recent times.

First, you’ll take a look at the dispute that started in February 2016 between the Federal Bureau of Investigation (FBI) and Apple Inc. The FBI wanted Apple to unlock an iPhone belonging to a terrorist from the December 2, 2015, attack in San Bernardino, California, by writing software that would undermine the security ...

Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.