19.8 Summary
In this chapter, we discussed common attacks on cryptography. We mostly focused on attacks relevant to cryptographic protocols such as TLS, that is, attacks that are independent of the underlying cryptographic primitives. We then complemented our discussion with attacks on symmetric and asymmetric encryption schemes and hash functions. The security of digital signatures, which are based either on RSA or on elliptic curves, relies on the security of these cryptographic primitives.
In the next chapter, we will cover actual, real-world attacks on the TLS Handshake protocol. The material covered in this chapter will make it easier for you to understand those attacks.