next to using other means such as ``kinetic-decryption'' (breaking in, stealing
keys) or planting backdoors and rigging random number generators, etc.
-
This following whitepaper can only address one aspect of securing our
information systems: getting the crypto settings right. Other attacks, as the
above mentioned, require different protection schemes which are not covered in
}
\pretitle{\vspace{-30pt} \begin{flushleft} \HorRule
- \fontsize{50}{50} \usefont{OT1}{phv}{b}{n} \color{DarkRed} \selectfont
+ \fontsize{36}{36} \usefont{OT1}{phv}{b}{n} \color{DarkRed} \selectfont
}
\title{Applied Crypto Hardening}
\posttitle{\par\end{flushleft}\vskip 0.5em}
\\ \vskip 0.5em (FH Campus Wien, VRVis, CERT.at, Karlsruhe Institute of Technology)
\par\end{flushleft}\HorRule}
-\date{2013-11-03}
+\date{2013-11-04}
% The first character should be within \initial{}
%\initial{H}\textbf{ere is some sample text to show the initial in the introductory paragraph of this template article. The color and lineheight of the initial can be modified in the preamble of this document.}
-
\input{abstract}
-
\newpage
-
\tableofcontents
-
\newpage
-
\input{disclaimer}
\input{motivation}
\input{methods}