Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
2 reactions
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
0 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
0 reply
2 recasts
3 reactions
0 reply
1 recast
2 reactions
0 reply
1 recast
2 reactions
0 reply
0 recast
1 reaction
0 reply
0 recast
2 reactions
0 reply
0 recast
0 reaction
0 reply
0 recast
3 reactions
0 reply
0 recast
0 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
1 reaction
Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good algorithms and protocols are required (similarly, good materials are required to construct a strong building), but good system design and implementation is needed as well: "it is possible to build a cryptographically weak system using strong algorithms and protocols" (just like the use of good materials in construction does not guarantee a solid structure). Many real-life systems turn out to be weak when the strong cryptography is not used properly, for example, random nonces are reused[6] A successful attack might not even involve algorithm at all, for example, if the key is generated from a password, guessing a weak password is easy and does not depend on the strength of the cryptographic primitives.[7] A user can become the weakest link in the overall picture, for example, by sharing passwords and hardware tokens with the colleagues 0 reply
0 recast
0 reaction