Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_principle
|
| gptkbp:alternativeName |
gptkb:Kerckhoffs's_assumption
gptkb:Kerckhoffs's_desiderata |
| gptkbp:appliesTo |
cryptography
|
| gptkbp:category |
information security
|
| gptkbp:formedBy |
gptkb:Auguste_Kerckhoffs
1883 |
| gptkbp:hasConcept |
System security should not depend on secrecy of the algorithm.
|
| gptkbp:influenced |
gptkb:Shannon's_maxim
|
| gptkbp:opposedBy |
security through obscurity
|
| gptkbp:publishedIn |
gptkb:La_Cryptographie_Militaire
|
| gptkbp:relatedTo |
security through obscurity
|
| gptkbp:state |
A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
|
| gptkbp:usedIn |
modern cryptographic design
|
| gptkbp:bfsParent |
gptkb:Kerckhoff_Ackerman
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Kerckhoff's principle
|