Provided by: International Journal of Engineering Trends and Technology
Date Added: May 2014
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as public key cryptography, uses two different keys (which form a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message - not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm.