Public Key Cryptography Algorithm Using Binary Manipulation and Chinese Remainder Theorem

Download Now
Provided by: International Journal of Recent Technology and Engineering (IJRTE)
Topic: Security
Format: PDF
Cryptography enables all processes, transactions, and communications to be safely performed electronically. Public key achieve confidentiality and has the ability to create a digital signature where as private key achieve confidentiality. Public key cryptography is an extremely active subject of research with important applications in electronic commerce and internet security. In particular key exchange is used in secure socket layer protected communication and public key digital signature is used to verify the malicious software. This paper explains a public-key cryptography algorithm using Chinese Remainder Theorem and binary manipulations such as reverse, division, multiply and addition of binary number etc.
Download Now

Find By Topic