Answer Posted / nidhi aggarwal
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
How is RSA used for encryption in practice?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
Can users of rsa run out of distinct primes?
What happens if I lose my private key?
What are lattice-based cryptosystems ?
What is the quantum cryptography?
What is SecurID ?
What are covert channels ?
What are shift register cascades?
Can RSA be exported from the U.S.?
What is S/MIME ?
What are the best discrete logarithm methods in use today ?
What is a CSU, or, How do certifying authorities store their private keys?
What happens if my private key is compromised?
What is a linear feedback shift register?