T 5.83 Compromising cryptographic keys

When cryptographic procedures are used, the gain in security depends to a great extent on how well the confidentiality of the secret cryptographic keys used is maintained. Once knowledge of the key and cryptographic algorithm used is obtained, it is usually easy to reverse the encryption and obtain the plain text. For this reason, a potential attacker will try to determine the key used for encryption. Possible points of attack for this purpose include the following: