network security
View Paper
ESSAY DETAILS
Words: 2810
Pages: 10
(approximately 235 words/page)
Pages: 10
(approximately 235 words/page)
Essay Database > Science & Technology
showed first 75 words of 2810 total
showed last 75 words of 2810 total
for example IT-Centre. (http://www.8j.net/local_forms/passwd.html) Appendix C "Public keys are a common use of asymmetric keys. Though secret keys are easy enough to implement between two users, what if we need to contact many different users, and all of the messages need to be encrypted? It is inefficient to call each person, and make up a new secret key, for each transmission. These calls also jeopardise key security". (Beyda, 1996)
for example IT-Centre. (http://www.8j.net/local_forms/passwd.html) Appendix C "Public keys are a common use of asymmetric keys. Though secret keys are easy enough to implement between two users, what if we need to contact many different users, and all of the messages need to be encrypted? It is inefficient to call each person, and make up a new secret key, for each transmission. These calls also jeopardise key security". (Beyda, 1996)