作者: Saman Shojae , Azizah Bt Abdul Manaf , Mazdak Zamani
DOI: 10.5772/35329
关键词:
摘要: The process of generating, distributing and revoking a cryptographic key is called management (Piper & Murphy, 2002; Fumy Landrock, 1993). Key very challenging area between cryptographers attackers, since finding keys approved techniques computationally impossible, attackers prefer to somehow breach the instead trying crack (Techateerawat Jennings, 2007).