Analyze encryption and public key infrastructure (PKI)
Vincent Lozupone
International Journal of Information Management, 2018, vol. 38, issue 1, 42-44
Abstract:
The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.
Keywords: Symmetric encryption; Secret key; Private key; Cryptography; Digital signatures; Hash functions; Lockbox; Block ciphers (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0268401217303195
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:ininma:v:38:y:2018:i:1:p:42-44
DOI: 10.1016/j.ijinfomgt.2017.08.004
Access Statistics for this article
International Journal of Information Management is currently edited by Yogesh K. Dwivedi
More articles in International Journal of Information Management from Elsevier
Bibliographic data for series maintained by Catherine Liu ().