Encryption Keys: Randomness Is Key to Their Undoing.
- Resource Type
- Article
- Authors
- Vacca, John R.; Cook, Cindy
- Source
- Information Systems Security. Winter2000, Vol. 8 Issue 4, p28. 6p.
- Subject
- *DATA encryption
*COMPUTER security
*COMPUTER crime prevention
- Language
- ISSN
- 1065-898X
Discusses various measures for maintaining the security of cryptographic keys of computer network systems. Advantages and disadvantages of code authentication; Use of entropy to identify hidden keys; Efficiency of authenticode type mechanisms in preventing computer attacks.