Key Erase
The "session code" that has been established is used only for that specific call. At termination, all the parameters are wiped from memory, and there is no way to reconstruct the code. Intercepted and stored encrypted material can be kept for later analysis, but there is no way to break the code except, possibly, by the time consuming trial-and-error method.
Read more about this topic: Crypto Phone
Famous quotes containing the words key and/or erase:
“This is the Key of the Kingdom:
In that Kingdom is a city;”
—Unknown. This Is the Key (l. 12)
“They circumcised women, little girls, in Jesuss time. Did he know? Did the subject anger or embarrass him? Did the early church erase the record? Jesus himself was circumcised; perhaps he thought only the cutting done to him was done to women, and therefore, since he survived, it was all right.”
—Alice Walker (b. 1944)