Answer Posted / nidhi aggarwal
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
How is rsa used for authentication in practice? What are rsa digital signatures?
What is identification ?
What is S/WAN ?
What are lattice-based cryptosystems ?
What are rsa digital signatures?
What is authenticated diffie-hellman key agreement?
What are some other hard problems ?
What are the best factoring methods in use today ?
What is primality testing ?
What is PSS/PSS-R ?
Are elliptic curve cryptosystems widely used ?
What are the most important attacks on MACs ?
What is a birthday attack?
What are certificates?
What are the ITU-T (CCITT) Standards ?