HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.83 Compromising cryptographic codes

T 5.83 Compromising cryptographic codes

When cryptographic procedures are used, the gain in security depends to a large extent on how confidential the secret cryptographic codes are. With knowledge of both the code and the cryptomethod used, it is normally easy to revert the encoding and obtain plain text. A potential perpetrator will therefore attempt to ascertain the code used. Possible points of attack are:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999
home