Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
5110706 | International Journal of Information Management | 2018 | 3 Pages |
Abstract
The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.
Keywords
Related Topics
Social Sciences and Humanities
Business, Management and Accounting
Management Information Systems
Authors
Vincent Lozupone,