O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Cryptography and Encryption

Abstract

There are few aspects of intercepting and analyzing communication more overwhelming than the effective use of encryption. Communications in which the strongest methods of encryption have been used are likely never to be broken for many decades. In order to break encryption, analysts need to understand the fundamentals of encryption to find flaws, weak points, and exploits to manage effectively encrypted data.

Keywords

Bypassing; Cracking; Cryptanalysis; Cryptography; Decryption; Encryption; Encryption keys; Machine learning; Passwords; Private keys; Processing power; Public keys; Steganography

Introduction

Several aspects of encryption overlap with that of steganography, but as in the steganography chapter, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required