Common use of Security Model Clause in Contracts

Security Model. This section defines the components of the system, the adversary and its capabilities and the meaning of system breakdown. 4.1.1. System The system comprises nodes belonging to one administrative unit under the same TA. It is assumed that TA has access to a cryptographically secure random number generator. The master keys are assumed secure and cannot be stolen. If need be, they can be deleted after generating all of the possible public and private key sets. The nodes have access to secure cryptographic algorithms, such as AESencryption and hash algorithms.

Appears in 2 contracts

Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme