Читать книгу Security Engineering - Ross Anderson - Страница 132
4.7 Managing encryption keys
ОглавлениеThe examples of security protocols that we've discussed so far are mostly about authenticating a principal's name, or application data such as the impulses driving a taximeter. There is one further class of authentication protocols that is very important – the protocols used to manage cryptographic keys.