O'Reilly logo

The Craft of System Security by Sean Smith, John Marchesini

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8. Subverting Cryptography

One of the most useful tools in the security toolkit is cryptography. Cryptography often plays a key role in the design and implementation of secure systems. However, often when we use cryptography in a practical setting, what we really think about is an abstract model of how cryptography ought to work. Unfortunately, reality is often messier than abstract models.

In this chapter, we present cautionary tales, discussing many areas where this gap has caused security problems.

  • Section 8.1 examines attacks made against symmetric-key cryptosystems that do not require brute force.
  • Section 8.2 looks at some of the popular brute-force attacks on DES.
  • Section 8.3 discusses a variety of attacks on public-key cryptosystems. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required