DocumentCode :
2865180
Title :
Communications cryptography
Author :
Khalifa, Othman O. ; Islam, Rafiqul ; Khan, S. ; Shebani, Mohammed S.
Author_Institution :
Electr. & Comput. Dept., Int. Islamic Univ. Malaysia, Jalan Gombak, Malaysia
fYear :
2004
fDate :
5-6 Oct. 2004
Firstpage :
220
Lastpage :
223
Abstract :
This paper focuses on the analysis of the two types of key cryptography which exist, based on the availability of the key publicly: private key cryptography, and public key cryptography. Both the sender and the recipient share a key that must be kept private. In the former case, the sender and recipient share a private key between the two of them which must be distributed first before actual communications take place. This analysis shows how very complicated and difficult this is to do properly. The most famous example of this type of cryptography is the data encryption standard (DES). In public key cryptography, each party has two sets of keys; one key is known to the public while the other is kept secret to the owner.
Keywords :
cryptography; data privacy; telecommunication security; DES; communications cryptography; data encryption standard; private key cryptography; public key cryptography; sender/recipient private shared key; Availability; Communication system security; Information security; Law enforcement; Privacy; Protection; Public key cryptography; Wire; Wireless networks; Writing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
RF and Microwave Conference, 2004. RFM 2004. Proceedings
Print_ISBN :
0-7803-8671-X
Type :
conf
DOI :
10.1109/RFM.2004.1411111
Filename :
1411111
Link To Document :
بازگشت