ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Comparison of Asymmetric Algorithms in Cryptography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)

Publication Date:

Authors : ; ;

Page : 1190-1196

Keywords : Cryptography; RSA; Elliptic curve cryptography; OAEP; Security;

Source : Downloadexternal Find it from : Google Scholarexternal


In this paper we compare asymmetric algorithm like (RSA , Elliptic curve ,OAEP) which is used for security when data is transmitting over the network. These algorithms are based on digital signature scheme. Digital signature is the technique of cryptography which is used for providing security to the users. Cryptographic technique is one of the principal means to protect information security. Not only this but it also ensures the information confidential, and also provides digital signature, authentication, secret sub-storage, system security and other functions. So encryption and decryption process is the solution of ensuring the non repudiation, confidentiality, integrity and authenticity of the data. These are the four main objectives of cryptography which is used to ensure the security of data.

Last modified: 2014-04-29 18:04:15