Basic Cryptographic Primitives
TCPA makes use of the following cryptographic primitives:
Random number generation
Key generation
Encryption (both asymmetric and symmetric)
Hash functions (also called hashing operations)
Digital signatures
Public key certificates (often referred to simply as certificates)
Generation of Random (or Pseudorandom) Bits and Sequences
The security of many cryptographic mechanisms that are used in TCPA depends upon the generation of unpredictable quantities. Examples include the primes in the RSA encryption and digital signature schemes, the secret key in the DES and 3DES encryption algorithms, and the nonce used in challenge-response integrity-checking systems. In all these cases, the quantities generated must be of sufficient ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.