25.8.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Threats to Encryption

Mohamed AIT OUAARAB

This module will discuss various threats to encryption in the form of government proposals to gain access to encrypted communications that weaken or even break the strong encryption used in common messaging apps and devices—commonly referred to as backdoor access. This term generally refers to a means of allowing a third party the ability to access the content of encrypted user communications and data in an unencrypted form, without the knowledge or consent of the sender or recipient.

Skills / Knowledge

  • Types of threats to encryption
  • Methods that enable access to encrypted data
  • Methods that involve access to users’ data before encryption or after decryption

Issued on

May 11, 2023

Expires on

Does not expire