Several proposals have been made for a processor that could decrypt encrypted machine instructions and data and then execute the instructions on the data. The processor would then encrypt the results. How would such a processor be useful? What are the design requirements for such a processor?
What will be an ideal response?
Note:
It
might
be
useful
to
discuss
the
Microsoft
Palladium
project
(mentioned
in
the
"Where
the
Field
Is
Headed"
section
of
Chapter
4)
in
the
context
of
a
processor
supported
by
built-?in
cryptography.
Computer Science & Information Technology
You might also like to view...
A(n) ________ report contains the data typed in the selected fields at the time you created the table
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ PowerPoint animation controls how an object leaves or disappears from a slide
Fill in the blank(s) with correct word
Computer Science & Information Technology