Page 78

• Government policy,

• Supporting infrastructure,

• Cost,

• Performance,

• Overall security environment,

• Usability,

• Quality certification and evaluation, and

• Interoperability standards.

Finally, any large-scale use of cryptography, with or without key escrow (discussed later in Chapter 5), depends on the existence of a substantial supporting infrastructure, the deployment of which raises a different set of problems and issues.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement