Electronics Home»Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 39

Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 39

Top Flaws in Distributed Authentication Systems and how they are Attacked

Share  Email
  Page: 39
See entire paper: http://electronics.wesrch.com/pdfEL11TZ3XNMONP
Page URL: http://electronics.wesrch.com/39-pdfEL11TZ3XNMONP
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
 
Page content:

Solutions to TLS and PKIX Dependencies

 Design protocols such that additional
cryptographic protections can be easily applied
 Unlike HTTP

 Employ message-level crypto for high value
messages

 Evaluate your design: will a one-time failure of
TLS equate to a permanent failure of your
protocol?

Insert presenter logo
here on slide master.
See hidden slide 2 for
directions

 

 
Subscribe
x