Implementation Attack -
Implementation Attack
Views: 0
Votes: 0 (Avg 0.0)
This type of attack exploits weaknesses in the implementation of a cryptography system. It focuses on exploiting the software code, not just errors and flaws but methodology employed to program the encryption system.
Average rating:
0.0
(0 reviews)
Sign in to manage your flashcard decks and leave a comment.
Discussion (0)
No comments yet. Be the first to share your experience with this term.