|
With the DKC process there is no secret method to be uncovered. Information on its internals is public and available to anyone who wants it. Unlike the RSA public-key Cryptography, therefore, there is no risk of attack or desire to break a hypothetical secret. Nor is there any impetus to uncover a unique mathematical methodology or approach to defraud the system.
The DKC process makes it considerably easier to recover keys when necessary. This easily implemented feature can be adapted to concerted action on the part of one or several company managers to solve the thorny issue of encryption key recovery for encrypted files (application retrogression, loss, user's departure, mischief, etc.) With the key recovery function, there is no negative impact from the loss or deterioration of keys. A qualified manager within the company can recreate the keys using public information. There is no additional cost for this function, no additional architecture and no need for an external third party.
The DKC process can also authenticate the various users of an information system by guaranteeing the reciprocity of this authentication.
The security level offered by the new Dynamic Key Cryptography is substantially higher than with the Secret Key or Public Key Cryptography since it really utilizes the technique and power of microcircuit card technology.
|
|