Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm

Download Now
Provided by: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Topic: Security
Format: PDF
Asymmetric cryptography or public-key cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user receives a public and private key pair from a certificate authority. Any other user who wants to send an encrypted message can get the intended recipient's public key from a public directory. They use this key to encrypt the message, and they send it to the recipient. When the recipient gets the message, they decrypt it with their private key, which no one else should have access to.
Download Now

Find By Topic