DocumentCode :
1993415
Title :
Encryption
Author :
Piper, Fred
Author_Institution :
London Univ., UK
fYear :
1997
fDate :
28-30 Apr 1997
Firstpage :
61
Lastpage :
65
Abstract :
We begin with a brief discussion of the need for information security. This is followed by a short introduction to cryptography, with emphasis on the need to provide confidentiality and authentication. The difference between symmetric and asymmetric (public key) systems is explained, and the importance of digital signatures and key management is emphasised. The paper ends with a discussion of how GSM uses symmetric cryptography to provide authentication and confidentiality
Keywords :
cryptography; GSM; asymmetric systems; authentication; confidentiality; digital signatures; encryption; information security; key management; symmetric cryptography;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Security and Detection, 1997. ECOS 97., European Conference on
Conference_Location :
London
ISSN :
0537-9989
Print_ISBN :
0-85296-683-0
Type :
conf
DOI :
10.1049/cp:19970422
Filename :
605800
Link To Document :
بازگشت