• Government policy,
• Supporting infrastructure,
• Overall security environment,
• Quality certification and evaluation, and
• Interoperability standards.
Finally, any large-scale use of cryptography, with or without key escrow (discussed later in Chapter 5), depends on the existence of a substantial supporting infrastructure, the deployment of which raises a different set of problems and issues.
The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Cryptography: Roles, Market, and Infrastructure ."
Cryptography's Role in Securing the Information Society . Washington, DC: The National Academies Press,
Please select a format: