From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Types of attacks

Types of attacks

From the course: Ethical Hacking: Cryptography

Start my 1-month free trial

Types of attacks

- [Instructor] Naturally because cybersecurity and cryptography is used to protect information, attackers are going to want to attack it. Now in an attacker's perfect world, they'd have access to every piece of the puzzle, right? They'd have the ciphertext, the algorithm that's used, the key, the decrypted text, but the truth is that's not realistic. If an attacker's attacking, it's because they only have a small piece of the puzzle, and they're trying to figure out, given the piece they have, how can they crack it. So depending on what piece of the puzzle the attacker has, we have different names for that type of attack. So the first is a Ciphertext-Only Attack. This means that the only thing the attacker has access to is the ciphertext meaning that garbled text, so they have the result of something that has been through a cryptographic algorithm. They don't have the key, and they don't have the original text. So as you…

Contents