Chapter 6

Cryptography and Encryption

Abstract

There are few aspects of intercepting and analyzing communication more overwhelming than the effective use of encryption. Communications in which the strongest methods of encryption have been used are likely never to be broken for many decades. In order to break encryption, analysts need to understand the fundamentals of encryption to find flaws, weak points, and exploits to manage effectively encrypted data.

Keywords

Bypassing; Cracking; Cryptanalysis; Cryptography; Decryption; Encryption; Encryption keys; Machine learning; Passwords; Private keys; Processing power; Public keys; Steganography

Introduction

Several aspects of encryption overlap with that of steganography, but as in the steganography chapter, ...

Get Hiding Behind the Keyboard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.