Keys will always be used from sender to receiver. The model is that keys are distributed well in advance, so that a receiving system will always have the correct key for current use. This specification defines a file format with a list of AES keys with time validity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |