Chapter 10: Protecting Cryptographic Techniques
Encryption and hashing algorithms, along with cryptographic tools and techniques, are designed to enhance the security of our data and systems. As with many other things, there is always the threat that someone can disrupt this security. This can occur if a malicious actor launches an attack on the very methods designed to protect us. In this chapter, we'll learn that it's essential to protect our cryptographic techniques, given that there are many threats that exist today.
First, we'll take a look at a number of attacks, including brute-force and password attacks, all designed to alter the integrity of our data or a system. We'll also see how there are tools readily available for the malicious actor and will take a brief look at Kali Linux. We will then outline an example of what happens when a less secure protocol is used, as we cover the deficiencies in the Wired Equivalency Protocol (WEP).
We'll also...