Crypto Phone - Key Erase

Key Erase

The "session code" that has been established is used only for that specific call. At termination, all the parameters are wiped from memory, and there is no way to reconstruct the code. Intercepted and stored encrypted material can be kept for later analysis, but there is no way to break the code except, possibly, by the time consuming trial-and-error method.

Read more about this topic:  Crypto Phone

Famous quotes containing the words key and/or erase:

    The key to the age may be this, or that, or the other, as the young orators describe; the key to all ages is—Imbecility: imbecility in the vast majority of men, at all times, and even in heroes, in all but certain eminent moments: victims of gravity, customs and fear. This gives force to the strong,—that the multitude have no habit of self-reliance or original action.
    Ralph Waldo Emerson (1803–1882)

    A person taking stock in middle age is like an artist or composer looking at an unfinished work; but whereas the composer and the painter can erase some of their past efforts, we cannot. We are stuck with what we have lived through. The trick is to finish it with a sense of design and a flourish rather than to patch up the holes or merely to add new patches to it.
    Harry S. Broudy (b. 1905)