Page 264 - CISSO_Prep_ Guide
P. 264
• Chosen plaintext.
• Examine probabilities of each
key in comparison with two
plaintexts that have been
encrypted.
• Linear Cryptanalysis:
• Known plaintext.
• Given enough pairs of
plain/ciphertext, you can figure
out the key.
• Differential linear cryptanalysis
(combination).
• Algebraic attacks.
• Other attacks include purchase-key
(bribery), rubber-hose, social engineering,
and implementation (WEP, Netscape)
attacks.
E-mail Security
• PEM, PGP, MOSS, S/MIME, MSP.
Internet Security
• 3D Secure
• Currency Cards
• SET
• SSL
• S-HTTP
• IPSec
• SSH
Steganography