Article ID Journal Published Year Pages File Type
5110706 International Journal of Information Management 2018 3 Pages PDF
Abstract

The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.

Related Topics
Social Sciences and Humanities Business, Management and Accounting Management Information Systems
Authors
,