Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
4. Cryptanalysis
  


Schematic of basic attacks page 6 of 12


An attacker might take a number of approaches in breaking a protocol. The protocol itself -- and also the consistency with which it is followed -- will affect which attacks are possible in a given case. The attacks described in the next panel are all most relevant to encryption protocols as such, and only indirect to other sorts of protocols that might be compromised (for example, digital signatures, online secure betting, authentication, secret sharing; some of these other protocols might still involve regular encryption in some of their steps). This tutorial will not attempt to detail just how each of these attacks might proceed (it depends on too many non-general issues); but in a general way, the fewer angles for attacks a protocol leaves open, the more secure it is likely to be.


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact