Analyze encryption and public key infrastructure (PKI)

被引:58
作者
Lozupone, Vincent [1 ]
机构
[1] Northcent Univ, 2488 Hist Decatur Rd, San Diego, CA 92106 USA
关键词
Symmetric encryption; Secret key; Private key; Cryptography; Digital signatures; Hash functions; Lockbox; Block ciphers;
D O I
10.1016/j.ijinfomgt.2017.08.004
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
050302 [传播学]; 071101 [系统理论];
摘要
The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.
引用
收藏
页码:42 / 44
页数:3
相关论文
共 10 条
[1]
Barukab OM., 2012, International Journal of Information Engineering and Electronic Business, V2, P36
[2]
CA trust management for the Web PKI [J].
Braun, Johannes ;
Volk, Florian ;
Classen, Jiska ;
Johannes, Buchmann ;
Muehlhaeuser, Max .
JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) :913-959
[3]
Cole E., 2008, NETWORK SECURITY FUN
[4]
El Uahhabi Zakia, 2014, 2014 Fifth International Conference on Next-Generation Networks and Services (NGNS), P255, DOI 10.1109/NGNS.2014.6990261
[5]
Entrust, 2017, WHAT IS PKI
[6]
Jayapandian N., 2016, FUT TRENDS RES INN S, V1
[7]
Certification Authorities Under Attack: A Plea for Certificate Legitimation [J].
Oppliger, Rolf .
IEEE INTERNET COMPUTING, 2014, 18 (01) :40-47
[8]
Parms J., 2020, SSL2BUY WIKI GET SOL
[9]
Singh N., 2017, INT J COMPUTATIONAL, V13
[10]
Villanueva J., 2015, WHAT IS DIGITAL SIGN