Authentication and Key Transport Using Public Key Cryptography

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is generally regarded that there are two main potential advantages of public key techniques over symmetric cryptography. The first is that public key systems allow the straightforward definition of digital signatures, thereby enabling the service of non-repudiation which is so useful in commercial applications. The second is the simplification of key management, because there is no requirement for the online third party that is part of typical protocols based on symmetric cryptography. The first of these advantages is not really our concern in this book since non-repudiation is of limited value in authentication and key establishment. However, the second advantage has led to a great variety of new key establishment protocols since the invention of public key cryptography. In the modern distributed communications environments exemplified by the Internet, public-key-based protocols have become far more important than protocols based on symmetric cryptography.

Cite

CITATION STYLE

APA

Boyd, C., Mathuria, A., & Stebila, D. (2020). Authentication and Key Transport Using Public Key Cryptography. In Information Security and Cryptography (pp. 135–164). Springer International Publishing. https://doi.org/10.1007/978-3-662-58146-9_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free