Abstract
Almost every security issue in our day-to-day lives stems not from weaknesses in cryptographic algorithms, but the environment in which cryptographic algorithms are executed. There is a dire need for investment in a (perhaps global) infrastructure for realizing sufficiently trustworthy hardware modules, which can provide a safe environment for execution of cryptographic algorithms. As security protocols guarantee the existence of specific application-specific relationships between application-specific inputs and outputs, in order to ensure application-specific assurances, the trusted environment should have the capability to execute a possibly unlimited number of application-specific algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ramkumar, M. (2014). Conclusions. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-07584-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07583-9
Online ISBN: 978-3-319-07584-6
eBook Packages: EngineeringEngineering (R0)