Attacks on cryptographic systems are nothing new. Whenever someone has information to hide, there is usually someone who would like to reveal it. William Frederick Friedman is considered one of the best cryptologists of all time. He helped break the encryption scheme used by the Japanese Purple Machine. Many of his inventions and cryptographic systems were never patented because they were considered so significant that the release of any information about them might aid an enemy. Following are some common attacks that an enemy might use to attack a cryptographic system:
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2