I am developing a crypto program. I want to know what security
considerations are to be taken account into account other then
using standard and time-tested algorithms.
I am puzzled as to what can be done to prevent Tempest Attack on
the decrypted text, programatically to some extent. For example:
PGP uses a special window to display decrypted text, which I heard,
foils tempest attack.
---------------------------------
Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them. � M.Gosser
considerations are to be taken account into account other then
using standard and time-tested algorithms.
I am puzzled as to what can be done to prevent Tempest Attack on
the decrypted text, programatically to some extent. For example:
PGP uses a special window to display decrypted text, which I heard,
foils tempest attack.
---------------------------------
Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them. � M.Gosser