Technical Perspective Backdoor Engineering

Authors
Kuhn, Markus G 

Loading...
Thumbnail Image
Type
Article
Change log
Abstract

Imagine you are a cyber spy. Your day job is to tap cryptographically protected communications systems. But how? Straightforward cryptanalysis has long become impractical: the task of breaking modern algorithms, if implemented correctly, far exceeds all computational power available to humanity. That leaves sabotage.

Publication Date
2018
Online Publication Date
2018-10-26
Acceptance Date
2018-03-09
Keywords
46 Information and Computing Sciences
Journal Title
COMMUNICATIONS OF THE ACM
Journal ISSN
0001-0782
1557-7317
Volume Title
61
Publisher
Association for Computing Machinery (ACM)
Rights
All rights reserved