Security Algorithms in Cryptography and Their Network Attacks

Download Now
Provided by: International Journal of Recent Development in Engineering and Technology (IJRDET)
Topic: Security
Format: PDF
Cryptography algorithms can be divided in to two groups that are symmetric key (also called as secret key) algorithms and asymmetric algorithms (also called as public key). In symmetric key same is used at both sides that are at sender side as well as receiver side. That is sender encrypt the message with same key as the receiver uses to decrypt the message. Where as in asymmetric key two different keys are used by sender and receiver to encrypt or decrypt the message. Sender uses the public key to encrypt the message whereas receiver uses the private key to decrypt the message.
Download Now

Find By Topic