You are not logged in.

Engaging smart engine for public key cryptography

Barco Silex
Written by Warren Kelly | Published in
First published: 02-01-2012
Size578.05 KB
Create DateSeptember 24, 2014
Last UpdatedApril 16, 2015

The technology to secure communications is well-known. Nevertheless, a lot of channels transporting critical information are still not correctly protected. The main reason is that security protocols rely on cryptographic algorithms that are very compute intensive.

This white paper outlines the differences between symmetric and asymmetric cryptography. It also discusses the benefits and problems that are associated with each one.

Engaging Smart Engine for Public Key cryptography

Are you a returning visitor?

Please confirm your email address to download
Email Address:*

Are you a new visitor?

Please confirm your details below and then click on download
Email Address: *
First Name*
Last Name*
Company Name*
Job Function*
By registering for this free service, you are agreeing that your business contact information as detailed above will be shared with organisations whose content you choose to download on this website. We will also keep you up to date as new reports arrive via our weekly newsletter service. We take privacy seriously. Please view our privacy policy and cookie policy pages for more information.
*I understand and agree
*Required field