• DocumentCode
    1993415
  • Title

    Encryption

  • Author

    Piper, Fred

  • Author_Institution
    London Univ., UK
  • fYear
    1997
  • fDate
    28-30 Apr 1997
  • Firstpage
    61
  • Lastpage
    65
  • Abstract
    We begin with a brief discussion of the need for information security. This is followed by a short introduction to cryptography, with emphasis on the need to provide confidentiality and authentication. The difference between symmetric and asymmetric (public key) systems is explained, and the importance of digital signatures and key management is emphasised. The paper ends with a discussion of how GSM uses symmetric cryptography to provide authentication and confidentiality
  • Keywords
    cryptography; GSM; asymmetric systems; authentication; confidentiality; digital signatures; encryption; information security; key management; symmetric cryptography;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Security and Detection, 1997. ECOS 97., European Conference on
  • Conference_Location
    London
  • ISSN
    0537-9989
  • Print_ISBN
    0-85296-683-0
  • Type

    conf

  • DOI
    10.1049/cp:19970422
  • Filename
    605800