Repository logo
 

Technical Perspective Backdoor Engineering

Accepted version
Peer-reviewed

Type

Article

Change log

Authors

Kuhn, Markus G 

Abstract

Imagine you are a cyber spy. Your day job is to tap cryptographically protected communications systems. But how? Straightforward cryptanalysis has long become impractical: the task of breaking modern algorithms, if implemented correctly, far exceeds all computational power available to humanity. That leaves sabotage.

Description

Keywords

46 Information and Computing Sciences

Journal Title

COMMUNICATIONS OF THE ACM

Conference Name

Journal ISSN

0001-0782
1557-7317

Volume Title

61

Publisher

Association for Computing Machinery (ACM)

Rights

All rights reserved