Cryptography is used to secure information from unintended viewing or modification, which naturally means malicious actors want to attack it. In this video, learn about the common families of cryptographic attacks.
- [Instructor] Naturally because cybersecurity…and cryptography is used to protect information,…attackers are going to want to attack it.…Now in an attacker's perfect world,…they'd have access to every piece of the puzzle, right?…They'd have the ciphertext, the algorithm that's used,…the key, the decrypted text,…but the truth is that's not realistic.…If an attacker's attacking,…it's because they only have a small piece of the puzzle,…and they're trying to figure out, given the piece they have,…how can they crack it.…So depending on what piece of the puzzle the attacker has,…we have different names for that type of attack.…So the first is a Ciphertext-Only Attack.…This means that the only thing the attacker has access to…is the ciphertext meaning that garbled text,…so they have the result of something that has been…through a cryptographic algorithm.…
They don't have the key,…and they don't have the original text.…So as you can see in the diagram,…this is often the case when…say they intercept communications,…so they intercept cybersecurity ciphertext,…
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks