First page Back Continue Last page Summary Graphic
43. Disrupt Distributions
During the electronic distribution of the cryptosystem, corrupt a byte and watch the distribution fail.
Do this again and again and the system will fall into disrepute.
- Most key distribution protocols are not resilient against denial of service attacks.
- The packets containing the distribution protocol use normal checksums.
- Thus, the protocol will fail - slowly...
Notes: