Communications cryptography
In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2004
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/5900/1/01411111.pdf http://irep.iium.edu.my/5900/ http://dx.doi.org/10.1109/RFM.2004.1411111 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.5900 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.59002019-11-12T06:41:48Z http://irep.iium.edu.my/5900/ Communications cryptography Khalifa, Othman Omran Islam, Md. Rafiqul Khan, Sheroz Shebani, Mohammed S. T Technology (General) In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and privacy o f information that is sent over the electronic communications media is in need. Whether the communications media is wired o r wireless, both can be not protected from unauthorized reception or interception of transmission. The, method of transforming the original information into the unreadable format is called encryption and decryption of information. The study o f encryption and decryption is known as Cryptography. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, t h e science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role in the World War I and 11. This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. Both the sender and the recipient share a key that must be kept private. In the former case the sender and recipient share a private key between the two o f them which must be distributed first before actual communications take place. This analysis shows how much complicated and difficult to do properly. T h e most famous example o f t h i s type of cryptography is the Data Encryption Standard (DES). In the Public Key Cryptography, each party has two sets o f keys; one key is known to the public while the other is kept secret to the owner. 2004 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/5900/1/01411111.pdf Khalifa, Othman Omran and Islam, Md. Rafiqul and Khan, Sheroz and Shebani, Mohammed S. (2004) Communications cryptography. In: 2004 RF and Microwave Conference, 5 - 6 October 2004, Subang, Selangor. http://dx.doi.org/10.1109/RFM.2004.1411111 doi:10.1109/RFM.2004.1411111 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Khalifa, Othman Omran Islam, Md. Rafiqul Khan, Sheroz Shebani, Mohammed S. Communications cryptography |
description |
In today's information age,
communications play an important role which 1s
contributed to the growth o f technologies. Electronic
security is increasingly involved in making
communications more prevalent. Therefore, a
mechanism is needed to assure the security and
privacy o f information that is sent over the electronic
communications media is in need. Whether the
communications media is wired o r wireless, both can
be not protected from unauthorized reception or
interception of transmission. The, method of
transforming the original information into the
unreadable format is called encryption and decryption
of information. The study o f encryption and decryption
is known as Cryptography. Cryptography or
communication by using secret code was used by the
Egyptians some 4000 years ago. However, t h e science
of cryptography was initiated by Arabs since 600s.
Cryptography becomes vital in the twentieth century
where it played a crucial role in the World War I and 11.
This paper focuses on the analysis of the two types of
key cryptography exists, based on the availability of
the key publicly: Private key Cryptography, and Public
Key Cryptography. Both the sender and the recipient
share a key that must be kept private. In the former
case the sender and recipient share a private key
between the two o f them which must be distributed
first before actual communications take place. This
analysis shows how much complicated and difficult to
do properly. T h e most famous example o f t h i s type of
cryptography is the Data Encryption Standard (DES).
In the Public Key Cryptography, each party has two
sets o f keys; one key is known to the public while the
other is kept secret to the owner. |
format |
Conference or Workshop Item |
author |
Khalifa, Othman Omran Islam, Md. Rafiqul Khan, Sheroz Shebani, Mohammed S. |
author_facet |
Khalifa, Othman Omran Islam, Md. Rafiqul Khan, Sheroz Shebani, Mohammed S. |
author_sort |
Khalifa, Othman Omran |
title |
Communications cryptography |
title_short |
Communications cryptography |
title_full |
Communications cryptography |
title_fullStr |
Communications cryptography |
title_full_unstemmed |
Communications cryptography |
title_sort |
communications cryptography |
publishDate |
2004 |
url |
http://irep.iium.edu.my/5900/1/01411111.pdf http://irep.iium.edu.my/5900/ http://dx.doi.org/10.1109/RFM.2004.1411111 |
_version_ |
1651865879636344832 |
score |
13.211869 |