Encryption 101: Decryptor’s thought process

Credit to Author: Vasilios Hioureas| Date: Tue, 27 Mar 2018 15:00:00 +0000

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak…

Categories:

Tags:

(Read more…)

The post Encryption 101: Decryptor’s thought process appeared first on Malwarebytes Labs.

Read more

Encryption 101: How to break encryption

Credit to Author: Vasilios Hioureas| Date: Tue, 06 Mar 2018 19:10:34 +0000

Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an error in implementation.

Categories:

Tags:

(Read more…)

The post Encryption 101: How to break encryption appeared first on Malwarebytes Labs.

Read more