Several proposals have been made for a processor that could decrypt encrypted machine instructions and data and then execute the instructions on the data. The processor would then encrypt the results. How would such a processor be useful? What are the design requirements for such a processor?

What will be an ideal response?

Note:
It
might
be
useful
to
discuss
the
Microsoft
Palladium
project
(mentioned
in
the
"Where
the
Field
Is
Headed"
section
of
Chapter
4)
in
the
context
of
a
processor
supported
by
built-­?in
cryptography.

Computer Science & Information Technology

You might also like to view...

A(n) ________ report contains the data typed in the selected fields at the time you created the table

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ PowerPoint animation controls how an object leaves or disappears from a slide

Fill in the blank(s) with correct word

Computer Science & Information Technology