The Mathematics used to secure data. Metauni Lectures Cryptography Seminar 1 - Foundations Vulnerabilities CA Compromise Key Compromise Flawed Cryptographic Algorithm Implementation Outdated Algorithms Weak Random Number Generation Attacks Side Channel Attack SSL Stripping SSL Downgrade Collision Attack Birthday Attack Pass The Hash Attack