Description
In this module, you will learn about attacks such as Brute force, Cipher text-only, Known plaintext, Chosen plaintext, Chosen ciphertext, Block cipher, Weak Key, Algebraic, Stream cipher, Hash function, Message authentication, Man-in-the-middle, Implementation, Side channel, Fault Analysis, Probing, Factoring, Random number generator, Rainbow table, Dictionary attacks, Reverse engineering, Social engineering and Other attacks.