- 603 Downloads
In this last chapter, we present some application ideas that possibly allow existing secure communication applications to become more efficient, easier to use, and more resilient to cryptographic key related attacks. It would be our great pleasure if readers find more usages of dynamic secrets. Firstly, we propose to use dynamic secrets to secure business transactions for mobile users. Dynamic secrets may replace traditional usernames and passwords to form a strong and unique credential to prove the legitimate identity of users. Secondly, we expand the idea of dynamic secrets to the software copyright regime. The use of dynamic secrets can help the software maker distinguish a legitimate software copy installed on multiple computers and a pirate copy. Thirdly, we discusses the potential collaboration between dynamic secrets and energy efficient wireless communication schemes. The reduction on transmission power could be a positive factor for communication security because the eavesdropping adversary would have higher information loss rate.