Answer Posted / nidhi aggarwal
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
Is cryptography patentable in the U.S.?
What is primality testing ?
How much extra message length is caused by using RSA?
What is identification ?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
How do elliptic curve cryptosystems compare with other cryptosystems ?
What other stream ciphers are there?
What is feal?
What are the most important attacks on MACs ?
What is SHS?
Are certifying authorities susceptible to attack?
Which cryptologic mechanisms can be used to protect integrity?
What is the NSA ?
How is RSA used for authentication in practice?
Is cryptography exportable from the U.S.?