Skip to main content

Security pitfalls in cryptographic design

Buy Article:

$38.75 plus tax (Refund Policy)

Highlights the common security pitfalls in cryptographic design. States that even strong encryption algorithms can be circumvented by bypassing the algorithms altogether and exploiting errors in the design, implementation, or installation. Examines attacks against passwords, hardware, trust models, failure recovery systems and users. Discusses the importance of attack detection in addition to attack prevention. Concludes that eventually, every system may be successfully attacked so it is essential to limit the damage that can be done and to capture evidence in the form of an audit trail for later use in a prosecution.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.
No Article Media
No Metrics

Keywords: Computer Security; Data Protection; Data Security; Encryption; Hacking

Document Type: Research Article

Publication date: 1998-03-01

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more