International Journal of Recent Technology and Engineering (IJRTE)
Cryptography enables all processes, transactions, and communications to be safely performed electronically. Public key achieve confidentiality and has the ability to create a digital signature where as private key achieve confidentiality. Public key cryptography is an extremely active subject of research with important applications in electronic commerce and internet security. In particular key exchange is used in secure socket layer protected communication and public key digital signature is used to verify the malicious software. This paper explains a public-key cryptography algorithm using Chinese Remainder Theorem and binary manipulations such as reverse, division, multiply and addition of binary number etc.