Security

Comparative Study of Various Key Exchanging Algorithms

Free registration required

Executive Summary

The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which somehow is distributed to them; or the use of key distribution centre. Finally, there is a feeling that key distribution is trivial when using public key encryption, compared to the rather cumbersome handshaking involved with key distribution canters for symmetric encryption. This paper provides an overview of various public key algorithms and a comparison between them is made on the basis of Key size, security and cost.

  • Format: PDF
  • Size: 456.9 KB