First page Back Continue Last page Summary Graphic
46. Find a Protocol Flaw
Find one of the many flaws in the cryptographic protocol used to do key exchange and private key distribution and exploit it to defeat the cryptosystem.
Current cryptographic protocols have been found to have many vulnerabilities.
Notes: