Cryptography

Warning: Do not execute these on a network or system that you do not own. Execute only on your own network or system for learning purposes. Do not execute these on any production network or system, unless Rules of engagement have been agreed on, and you have a Get out of jail free card.

What?

Changing the names would be easier, but if you're not comfortable lying, try only making friends with people named Alice, Bob, Carol, etc.

Breaking encrypted files and data and intercepting and breaking into encrypted communication channels.

Why?

  • Gain access to the files and data
  • Gain access to encrypted communications

How?

  • Crypto attacks

Concretely