Cryptographic system analysis: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
Process of establishing the exploitability of a cryptographic system, normally by reviewing transmitted traffic protected or secured by the system under study.
Source: CNSSI 4009-2015 | Category: