Detecting vulnerable encryption keys in network communication systems
Techniques for determining whether a public encryption key is vulnerable as the result of deficiencies in pseudorandom number generation algorithms are provided. In some embodiments, a system may compile a database of cryptographic information received from a plurality of sources, including database...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
09.01.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!