Cryptography Reference
In-Depth Information
20 . Our list of general categories of identification information in Section 8.3.3 is by
no means exhaustive.
(a) Another possible category of identification information is somewhere the
claimant is . Provide an example of entity authentication based on location
information.
(b) Can you think of any other categories of identification information?
21 .
In Table 1.2we provided amapping of cryptographic primitives that can be used
to help provide different cryptographic services (rather than largely providing
these services on their own). Now that we have completed our review of
cryptographic primitives, attempt to explain all the 'yes' entries in this table
by providing examples of each primitive being used as part of the provision of
the relevant service.
Search WWH ::




Custom Search