Skip to main content

Conclusions

  • Chapter
  • First Online:
Symmetric Cryptographic Protocols
  • 543 Accesses

Abstract

Almost every security issue in our day-to-day lives stems not from weaknesses in cryptographic algorithms, but the environment in which cryptographic algorithms are executed. There is a dire need for investment in a (perhaps global) infrastructure for realizing sufficiently trustworthy hardware modules, which can provide a safe environment for execution of cryptographic algorithms. As security protocols guarantee the existence of specific application-specific relationships between application-specific inputs and outputs, in order to ensure application-specific assurances, the trusted environment should have the capability to execute a possibly unlimited number of application-specific algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahalingam Ramkumar .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ramkumar, M. (2014). Conclusions. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07584-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07583-9

  • Online ISBN: 978-3-319-07584-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics