ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Various Asymmetric Algorithms

Journal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.1, No. 4)

Publication Date:

Authors : ; ; ; ;

Page : 117-119

Keywords : RSA; A-RSA; Rabin; cipher text; plain text; encryption; decryption.;

Source : Downloadexternal Find it from : Google Scholarexternal


In this fast moving world, communication among several systems through networks play a vital role. Being available to everybody, this also shares a risk factor of being easily traceable by anyone in the network. The need for network security is never fully satisfied. Making every communication through a network strictly secured is something next to impossible. And so we ought to choose a method where even if the transmitted data is hacked, it can be made to remain inaccessible or not understandable. This method is called encryption. The method that acts vice versa (i.e) making a data that is not understandable text into an understandable data is called decryption. The cryptosystem consists of both symmetric cryptography algorithms and asymmetric cryptography algorithms. Some of the asymmetric cryptography algorithms are discussed in this paper.

Last modified: 2016-12-24 14:19:30