Cryptography

Search the web and find a resource on how cryptography has been used to either defeat or defend a secured network.

Provide the URL for the resource you found. Give a brief, one-paragraph description of the circumstances, including the tool used, the name of the attack, and other information. Describe how cryptography was used in the attack or defense of the network, as you understand it.

Our customer support team is here to answer your questions. Ask us anything!