Summary
In this chapter, we outlined the importance of protecting encryption protocols, processes, and cryptographic techniques. We saw how attacks such as an MiTM attack or a brute-force attack on encrypted data can minimize or negate the effectiveness of these techniques. We discussed Kali Linux, a freely available suite in a hacker's arsenal, which contains hundreds of tools. We then reviewed the dangers of how implementing a weak cipher, such as WEP, can lead to the exposure of data.
We then took a look at some of the attacks against the PKI, which is a framework or infrastructure that is essential for securing data effectively. We saw how various attacks, such as an SSL/TLS strip and DoS attacks, can render the cryptographic processes, elements, and algorithms in PKI useless.
We finished with a discussion on how, over time, there have been advances in computing, with one of these advances being quantum computing. We learned that, because of the power of quantum computing...