Answer Posted / nidhi aggarwal
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
Should a public key or private key be shared among users?
What are interactive proofs and zero-knowledge proofs ?
What is a digital time-stamping service?
Explain the meaning of Cryptography.
What is a CSU, or, How do certifying authorities store their private keys?
What is a birthday attack?
Is cryptography exportable from the U.S.?
What is identification ?
Is cryptography patentable in the U.S.?
Can DES be exported from the U.S.?
What are the prospects for theoretical factoring breakthroughs?
How is RSA used for encryption in practice?
What is the discrete logarithm problem ?
What happens if my private key is compromised?
What is S/WAN ?