21

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Footnote 21

Many cryptographic systems will function securely only if the keys are lengthy and complex, too lengthy and complex for a person to easily remember or use.