Summary

  • Do realize that key exchange alone is often not secure. You must also authenticate the other party or parties.

  • Do use off-the-shelf solutions for session establishment, such as SSL/TLS.

  • Do ensure that you read all the fine print to make sure you have strongly authenticated every party.

  • Consider calling in a cryptographer if you insist on using custom solutions.



19 Deadly Sins of Software Security. Programming Flaws and How to Fix Them
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net