Chapter 5: Cryptography and the Penetration Tester