Part 1: Ethical Hacking
Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 3 paragraphs in length
Be sure to include your reference citation.
Part 2: Ethical Hacking
Cryptography is used to protect confidential data in many areas. Choose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).