International Journal of Engineering Trends and Technology
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as public key cryptography, uses two different keys (which form a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message - not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm.