Technical Perspective Backdoor Engineering
Accepted version
Peer-reviewed
Repository URI
Repository DOI
Change log
Authors
Kuhn, Markus G
Abstract
Imagine you are a cyber spy. Your day job is to tap cryptographically protected communications systems. But how? Straightforward cryptanalysis has long become impractical: the task of breaking modern algorithms, if implemented correctly, far exceeds all computational power available to humanity. That leaves sabotage.
Description
Keywords
46 Information and Computing Sciences
Journal Title
COMMUNICATIONS OF THE ACM
Conference Name
Journal ISSN
0001-0782
1557-7317
1557-7317
Volume Title
61
Publisher
Association for Computing Machinery (ACM)
Publisher DOI
Rights
All rights reserved