TCPA makes use of the following cryptographic primitives:
Random number generation
Encryption (both asymmetric and symmetric)
Hash functions (also called hashing operations)
Public key certificates (often referred to simply as certificates)
The security of many cryptographic mechanisms that are used in TCPA depends upon the generation of unpredictable quantities. Examples include the primes in the RSA encryption and digital signature schemes, the secret key in the DES and 3DES encryption algorithms, and the nonce used in challenge-response integrity-checking systems. In all these cases, the quantities generated must be of sufficient ...