From the course: Penetration Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Encryption and cryptographic attacks
From the course: Penetration Testing and Ethical Hacking
Encryption and cryptographic attacks
- [Instructor] Encryption and cryptographic attacks. In this lesson, we're going to cover cryptography attacks as well as encryption techniques. So let's get started. Okay, first, before we begin our discussion on cryptographic attacks and encryption, let's look at some cryptography tools, encryption tools, tools used to encrypt data, Advanced Encryption Package, BCTextEncoder, Secret Space Encryptor, CryptoSymm, Cipher Sender, MD5 Hash Calculators, HashCalc, MD5 Calculator and HashMYFiles, and hash calculators for mobile devices, MD5 Hash Cal, Hash Droid, and Hash Calculator. The first protocol or technique and system we're going to talk about is the Public Key Infrastructure, or PKI. So PKI is a combination of policies, hardware, procedures, and software and people that are required to create, manage, and revoke digital certificates. So it's a whole infrastructure built around the process of creating, managing, and revoking certificates. This can be within an organization. This can…