System Issues
Protocol design is the easy part of key recovery.
All aspects of the total system design must be scrutinized, including the human element.
Can an attacker go around the cryptography?
Previous slide
Next slide
Back to first slide
View graphic version