Comparison of Asymmetric Algorithms in Cryptography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)Publication Date: 2014-04-30
Authors : Neha Garg; Partibha Yadav;
Page : 1190-1196
Keywords : Cryptography; RSA; Elliptic curve cryptography; OAEP; Security;
Abstract
In this paper we compare asymmetric algorithm like (RSA , Elliptic curve ,OAEP) which is used for security when data is transmitting over the network. These algorithms are based on digital signature scheme. Digital signature is the technique of cryptography which is used for providing security to the users. Cryptographic technique is one of the principal means to protect information security. Not only this but it also ensures the information confidential, and also provides digital signature, authentication, secret sub-storage, system security and other functions. So encryption and decryption process is the solution of ensuring the non repudiation, confidentiality, integrity and authenticity of the data. These are the four main objectives of cryptography which is used to ensure the security of data.
Other Latest Articles
- A NOVAL HINDI LANGUAGE INTERFACE FOR DATABASES?
- SECURITY ISSUES IN WIRELESS BODY AREA NETWORK?
- Forbidden Twin Substantiate Consuming Hash Generation and SVM?
- FALIURES OF SUPERVISORY BODIES AND RATING AGENCIES IN MORTGAGE CRISIS ESCALATION
- THE ROLE OF THE NATIONAL BANK OF SERBIA IN ACHEVING MONETARY STABILITY
Last modified: 2014-04-29 18:04:15