Attacking, or cracking, cryptography requires a strategy and a plan. In this video, explore the main types of strategies used for cracking cryptography.
- [Instructor] If you're going to try…attacking cryptography,…you need to have some kind of a strategy.…So we're going to talk through a couple of different strategies…for attacking cryptography.…The first is trickery and deceit,…which we often just call social engineering.…If you can trick or convince somebody…to simply give you their password,…give you their key,…that's often the easiest route in.…Things like frequency analysis can also be very useful.…So, for example, a histogram of the frequency…of letters or groups.…If you were to look at English as a language,…what you would find is, statistically, over long novels,…that E is the most common letter in the English language…used by far,…followed by T, A, and O.…
Using that knowledge, you may be able to glean…the original content of something simply based…on the frequency of how letters…or groupings of letters appear.…The next is brute force, and this is, really,…no pizazz to it, it is…just trying every possible combination.…The key length can be a big factor in this,…
Released
12/9/2019Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks
Share this video
Embed this video
Video: Code-breaking methodologies