Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Public Key Cryptography (PKC)

Handbook of Research on Information Security and Assurance
Also known as asymmetric cryptography, it uses two keys—a “public key” and a “private key” —to implement an encryption.
Published in Chapter:
Cryptography for Information Security
Wasim A. Al-Hamdani (Kentucky State University, USA)
Copyright: © 2009 |Pages: 17
DOI: 10.4018/978-1-59904-855-0.ch011
Abstract
This chapter introduces cryptography from information security phase rather than from deep mathematical and theoretical aspects, along with cryptography application in information security. The chapters introduce classical cryptography, block, stream cipher, and public key family, and with the most advance systems as elliptic curve, digital signature, cryptography key managements, and the last part of the chapter are the cryptography application in protocols, communications, e-mails, and the most advance research topics.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Implications of Cybersecurity Breaches in LPWANs
Also known as asymmetric cryptography, is a class of cryptographic algorithms that uses pairs of keys: A public key that everyone can know and a private key that is only known by one entity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR