Abstract
Almost every security issue in our day-to-day lives stems not from weaknesses in cryptographic algorithms, but the environment in which cryptographic algorithms are executed. There is a dire need for investment in a (perhaps global) infrastructure for realizing sufficiently trustworthy hardware modules, which can provide a safe environment for execution of cryptographic algorithms. As security protocols guarantee the existence of specific application-specific relationships between application-specific inputs and outputs, in order to ensure application-specific assurances, the trusted environment should have the capability to execute a possibly unlimited number of application-specific algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ramkumar, M. (2014). Conclusions. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-07584-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07583-9
Online ISBN: 978-3-319-07584-6
eBook Packages: EngineeringEngineering (R0)