Security blanket
โ Scribed by Helen Meyer
- Book ID
- 104298027
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 133 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
Abstracts of Recent Articles and Litera We complex infrastructure to ensure security. There must be trusted organizations which issue and authenticate keys, and which make sure that people using keys really are who they claim to be. Users have to change keys regularly, protect keys from theft, and ensure they're not using out-of-date versions of other people's public keys. SET, however, will survive its teething problems, if only because there's no viable alternative to public-key encryption for mass-market systems. Systems based on seemingly strong encryption are frighteningly susceptible to basic design flaws as two US students illustrated with Netscape when they discovered that a randomnumber generator used for encryption wasn't random enough. Netscape immediately issued a patch correcting the flaw, but the students had proved that even the biggest and best systems are vulnerable to a bit of lateral thinking. The lesson is that encryption is only a tool,and it is the way in which it is implemented that is important.
๐ SIMILAR VOLUMES
**BESTSELLING AUTHOR COLLECTION **Reader-favorite romances in collectible volumes from our bestselling authors.**** **That Forever Feeling** by #1 New York Times bestselling author **Linda Lael Miller** Amanda Scott is wary of love ever since she fell for a married man. Deciding to focus on he