First page Back Continue Last page Summary Graphic
43. Disrupt Distributions
- During the electronic distribution of the cryptosystem, corrupt a byte and watch the distribution fail.
- Do this again and again and the system will fall into disrepute.- Most key distribution protocols are not resilient against denial of service attacks.
- The packets containing the distribution protocol use normal checksums.
- Thus, the protocol will fail - slowly...
 
Notes: