Attacking the infrastructure
Most cryptosystems require a framework or infrastructure in order to effectively secure data. One infrastructure that enables all parties to communicate securely with one another is the PKI. PKI comprises the processes, elements, and algorithms that are required to securely send and receive data.
In addition to individual protocols, PKI can also suffer from attacks. In this section, we'll see how the PKI can provide the trust we need when making transactions on the internet. We'll then see how the PKI can be a target and can suffer from attacks such as an SSL/TLS strip, using stolen certificates to distribute malware, and denial-of-service attacks.
Let's start with a discussion on how the PKI guarantees trust.
Guaranteeing trust
When interacting with a company, it's important that you work with someone you can trust. If dealing with a traditional brick and mortar entity, you might look for a sign that shows an excellent...