31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

c. The degree of trust placed in the RA and the CA,<br />

d. The strength of the key establishment protocols, and<br />

e. The care of the users to protect their keys from unauthorized use.<br />

March, 2007<br />

Therefore, the design of a security system that provides the desired security services by making<br />

use of cryptographic algorithms and sound key management techniques requires a high degree of<br />

skill and expertise.<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!