DocumentCode
1993415
Title
Encryption
Author
Piper, Fred
Author_Institution
London Univ., UK
fYear
1997
fDate
28-30 Apr 1997
Firstpage
61
Lastpage
65
Abstract
We begin with a brief discussion of the need for information security. This is followed by a short introduction to cryptography, with emphasis on the need to provide confidentiality and authentication. The difference between symmetric and asymmetric (public key) systems is explained, and the importance of digital signatures and key management is emphasised. The paper ends with a discussion of how GSM uses symmetric cryptography to provide authentication and confidentiality
Keywords
cryptography; GSM; asymmetric systems; authentication; confidentiality; digital signatures; encryption; information security; key management; symmetric cryptography;
fLanguage
English
Publisher
iet
Conference_Titel
Security and Detection, 1997. ECOS 97., European Conference on
Conference_Location
London
ISSN
0537-9989
Print_ISBN
0-85296-683-0
Type
conf
DOI
10.1049/cp:19970422
Filename
605800
Link To Document