Page 264 - CISSO_Prep_ Guide
P. 264

•  Chosen plaintext.
                                 •  Examine probabilities of each
                                     key in comparison with two
                                     plaintexts that have been
                                     encrypted.
                          •  Linear Cryptanalysis:
                                 •  Known plaintext.
                                 •  Given enough pairs of
                                     plain/ciphertext, you can figure
                                     out the key.
                          •  Differential linear cryptanalysis
                              (combination).
                          •  Algebraic attacks.
                   •  Other attacks include purchase-key
                       (bribery), rubber-hose, social engineering,
                       and implementation (WEP, Netscape)
                       attacks.

               E-mail Security
                   •  PEM, PGP, MOSS, S/MIME, MSP.

               Internet Security
                   •  3D Secure
                   •  Currency Cards
                   •  SET
                   •  SSL
                   •  S-HTTP
                   •  IPSec
                   •  SSH

               Steganography
   259   260   261   262   263   264   265   266   267   268   269