7. Cryptanalysis in Practice

7.1Introduction
7.2Side Channel Attacks
7.3Backdoor Attacks
 Chapter Summary
 Sugestions for Further Reading

A man cannot be too careful in the choice of his enemies.

—Oscar Wilde (1854–1900), The Picture of Dorian Gray, 1891

If you reveal your secrets to the wind you should not blame the wind for revealing them to the trees.

—Kahlil Gibran (1883–1931)

There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult.

—Charles Antony Richard Hoare

Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.