Title: Asymmetric key algorithms-A Proposed Method

Author(s): MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay

Dept. of Computer Sc. & Engineering, University of Calcutta, Kolkata, India



Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.

License: This work is licensed under a Creative Commons Attribution 4.0 International License.


Website: http://www.ijecs.in

e-ISSN:  2319-724



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top