Communications cryptography

In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and...

Full description

Bibliographic Details
Main Authors: Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz, Shebani, Mohammed S.
Format: Conference or Workshop Item
Language:English
Published: 2004
Subjects:
Online Access:http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/1/01411111.pdf
id iium-5900
recordtype eprints
spelling iium-59002019-11-12T06:41:48Z http://irep.iium.edu.my/5900/ Communications cryptography Khalifa, Othman Omran Islam, Md. Rafiqul Khan, Sheroz Shebani, Mohammed S. T Technology (General) In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and privacy o f information that is sent over the electronic communications media is in need. Whether the communications media is wired o r wireless, both can be not protected from unauthorized reception or interception of transmission. The, method of transforming the original information into the unreadable format is called encryption and decryption of information. The study o f encryption and decryption is known as Cryptography. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, t h e science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role in the World War I and 11. This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. Both the sender and the recipient share a key that must be kept private. In the former case the sender and recipient share a private key between the two o f them which must be distributed first before actual communications take place. This analysis shows how much complicated and difficult to do properly. T h e most famous example o f t h i s type of cryptography is the Data Encryption Standard (DES). In the Public Key Cryptography, each party has two sets o f keys; one key is known to the public while the other is kept secret to the owner. 2004 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/5900/1/01411111.pdf Khalifa, Othman Omran and Islam, Md. Rafiqul and Khan, Sheroz and Shebani, Mohammed S. (2004) Communications cryptography. In: 2004 RF and Microwave Conference, 5 - 6 October 2004, Subang, Selangor. http://dx.doi.org/10.1109/RFM.2004.1411111 doi:10.1109/RFM.2004.1411111
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T Technology (General)
spellingShingle T Technology (General)
Khalifa, Othman Omran
Islam, Md. Rafiqul
Khan, Sheroz
Shebani, Mohammed S.
Communications cryptography
description In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and privacy o f information that is sent over the electronic communications media is in need. Whether the communications media is wired o r wireless, both can be not protected from unauthorized reception or interception of transmission. The, method of transforming the original information into the unreadable format is called encryption and decryption of information. The study o f encryption and decryption is known as Cryptography. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, t h e science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role in the World War I and 11. This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. Both the sender and the recipient share a key that must be kept private. In the former case the sender and recipient share a private key between the two o f them which must be distributed first before actual communications take place. This analysis shows how much complicated and difficult to do properly. T h e most famous example o f t h i s type of cryptography is the Data Encryption Standard (DES). In the Public Key Cryptography, each party has two sets o f keys; one key is known to the public while the other is kept secret to the owner.
format Conference or Workshop Item
author Khalifa, Othman Omran
Islam, Md. Rafiqul
Khan, Sheroz
Shebani, Mohammed S.
author_facet Khalifa, Othman Omran
Islam, Md. Rafiqul
Khan, Sheroz
Shebani, Mohammed S.
author_sort Khalifa, Othman Omran
title Communications cryptography
title_short Communications cryptography
title_full Communications cryptography
title_fullStr Communications cryptography
title_full_unstemmed Communications cryptography
title_sort communications cryptography
publishDate 2004
url http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/
http://irep.iium.edu.my/5900/1/01411111.pdf
first_indexed 2023-09-18T20:14:42Z
last_indexed 2023-09-18T20:14:42Z
_version_ 1777407709865312256