Answer:
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
their intended users, and only for their intended purposes,
temper resistent hardware is introduced.
An example temper resistent device is your "SMART CARD".
You have to physically posess the device and also have to
possess the PIN or the password to use it.
Previous Question | Next Question |
Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts? | What are biometric techniques? |