Provided by:
International Journal of Engineering Trends and Technology
Topic:
Security
Format:
PDF
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as public key cryptography, uses two different keys (which form a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message - not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm.