A Survey on Various Asymmetric Algorithms
Journal: International Research Journal of Advanced Engineering and Science (Vol.1, No. 4)Publication Date: 2016-10-09
Authors : S. Sathish Kumar; S. R. Akshay Prabhu; R. Durga; S. Jeevitha;
Page : 117-119
Keywords : RSA; A-RSA; Rabin; cipher text; plain text; encryption; decryption.;
Abstract
In this fast moving world, communication among several systems through networks play a vital role. Being available to everybody, this also shares a risk factor of being easily traceable by anyone in the network. The need for network security is never fully satisfied. Making every communication through a network strictly secured is something next to impossible. And so we ought to choose a method where even if the transmitted data is hacked, it can be made to remain inaccessible or not understandable. This method is called encryption. The method that acts vice versa (i.e) making a data that is not understandable text into an understandable data is called decryption. The cryptosystem consists of both symmetric cryptography algorithms and asymmetric cryptography algorithms. Some of the asymmetric cryptography algorithms are discussed in this paper.
Other Latest Articles
Last modified: 2016-12-24 14:19:30