Information Systems

Discussion

 

1, For one of the cipher categories, describe a possible key management system, i.e., a method for creating, distributing, and storing cryptographic keys for the cipher category that you’ve picked, or

2. Constructively critique or expand upon a key management scheme described by another student.

If you choose to respond to #1, the key management system that you describe can either be a system in use (with appropriate citations), or a system of your own invention.