Analyze encryption and public key infrastructure (PKI)
作者:
Highlights:
•
摘要
The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.
论文关键词:Symmetric encryption,Secret key,Private key,Cryptography,Digital signatures,Hash functions,Lockbox,Block ciphers
论文评审过程:Received 22 April 2017, Revised 9 August 2017, Accepted 25 August 2017, Available online 22 September 2017, Version of Record 22 September 2017.
论文官网地址:https://doi.org/10.1016/j.ijinfomgt.2017.08.004