Impact factors involved in cryptoperiod computation in key compromise impersonation scenario
Abstract
Starting from the asymmetric encryption general protocols and vulnerability analysers, the present paper illustrate the most important factors, those owning the highest impact level on computation of cryptoperiod of keying data and material, as looked at in a key-compromise impersonation attack scenario. We support our researched list of such factors with mathematical principles and advanced computation techniques applied also on the cryptography theory of elliptic curves.
Full Text:
PDFDOI: https://doi.org/10.52846/ami.v46i2.1279