Cultural Differences
February 26, 2020
Implementation Of AI In Information Technology
February 26, 2020
Show all

Discussion

 

1, For one of the cipher categories, describe a possible key management system, i.e., a method for creating, distributing, and storing cryptographic keys for the cipher category that you’ve picked, or

2. Constructively critique or expand upon a key management scheme described by another student.

If you choose to respond to #1, the key management system that you describe can either be a system in use (with appropriate citations), or a system of your own invention.

Leave a Reply

Your email address will not be published. Required fields are marked *