Читать книгу Security Engineering - Ross Anderson - Страница 132

4.7 Managing encryption keys

Оглавление

The examples of security protocols that we've discussed so far are mostly about authenticating a principal's name, or application data such as the impulses driving a taximeter. There is one further class of authentication protocols that is very important – the protocols used to manage cryptographic keys.

Security Engineering

Подняться наверх