O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptanalysis

Up to this point, we have supposed that all algorithms come quality-assured. In theory, theory and practice should match; in practice, they don’t. Therefore, any algorithm might have a weakness that may be found and exploited. The good news is that any serious algorithm has been cryptanalyzed and tested by many cryptographers worldwide since its publication. Although this doesn’t guarantee that no weaknesses exist, it gives some assurance about the algorithm’s usability. For this very reason, it is prudent to use only public algorithms that have been subject to more research and cryptanalysis than most private or secret algorithms.

Weaknesses in algorithms are found using cryptanalysis, which is probably the most complex branch ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required