12.6 Trojans and public key implementation challenges