2009-09-25

Cracking Encryption Keys

We all know we need to protect sensitive, confidential or customer related data, with strong encryption algorithms and lengthy keys.

But where does the buck stop? How much security is too much security, for something with absolutely no financial value - like for example a calculator’s Operating System?

Texas Instruments Signing Keys Broken

No comments:

Post a Comment