8. Subverting Cryptography
One of the most useful tools in the security toolkit is cryptography. Cryptography often plays a key role in the design and implementation of secure systems. However, often when we use cryptography in a practical setting, what we really think about is an abstract model of how cryptography ought to work. Unfortunately, reality is often messier than abstract models.
In this chapter, we present cautionary tales, discussing many areas where this gap has caused security problems.
- Section 8.1 examines attacks made against symmetric-key cryptosystems that do not require brute force.
- Section 8.2 looks at some of the popular brute-force attacks on DES.
- Section 8.3 discusses a variety of attacks on public-key cryptosystems. ...
Get The Craft of System Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.