The Internet public key infrastructure

  title={The Internet public key infrastructure},
  author={Messaoud Benantar},
  journal={IBM Systems Journal},
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern computing security systems. By associating a public key with a private key, many of the key distribution… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 10 extracted citations


Publications referenced by this paper.
Showing 1-2 of 2 references

A Method for Obtaining Digital Signatures and Public - Key Cryptosystems

  • A. Shamir, L. M. Adleman
  • Communications of the ACM
  • 1978

Similar Papers

Loading similar papers…