Cryptography
In this installment we will examine the backbone of internet security - the science of cryptography has been around for 100s of years and in particular, digital encryoption is of the uptmost important in keeping the sensitive affairs of the internet safe. With many applications we will look at some of the ways the current encryption standards can be exploited.
In this chapter we will look specially at
- HASH EXTENSION ATTACKS
- SECRET KEY ENCRYPTION
- PUBLIC KEY ENCRYPTION
- MD5 COLLISION ATTACKS