DocumentCode
2865180
Title
Communications cryptography
Author
Khalifa, Othman O. ; Islam, Rafiqul ; Khan, S. ; Shebani, Mohammed S.
Author_Institution
Electr. & Comput. Dept., Int. Islamic Univ. Malaysia, Jalan Gombak, Malaysia
fYear
2004
fDate
5-6 Oct. 2004
Firstpage
220
Lastpage
223
Abstract
This paper focuses on the analysis of the two types of key cryptography which exist, based on the availability of the key publicly: private key cryptography, and public key cryptography. Both the sender and the recipient share a key that must be kept private. In the former case, the sender and recipient share a private key between the two of them which must be distributed first before actual communications take place. This analysis shows how very complicated and difficult this is to do properly. The most famous example of this type of cryptography is the data encryption standard (DES). In public key cryptography, each party has two sets of keys; one key is known to the public while the other is kept secret to the owner.
Keywords
cryptography; data privacy; telecommunication security; DES; communications cryptography; data encryption standard; private key cryptography; public key cryptography; sender/recipient private shared key; Availability; Communication system security; Information security; Law enforcement; Privacy; Protection; Public key cryptography; Wire; Wireless networks; Writing;
fLanguage
English
Publisher
ieee
Conference_Titel
RF and Microwave Conference, 2004. RFM 2004. Proceedings
Print_ISBN
0-7803-8671-X
Type
conf
DOI
10.1109/RFM.2004.1411111
Filename
1411111
Link To Document