Title: Asymmetric key algorithms-A Proposed Method

Author(s): MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay

Dept. of Computer Sc. & Engineering, University of Calcutta, Kolkata, India



Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.

License: This work is licensed under a Creative Commons Attribution 4.0 International License.


Website: http://www.ijecs.in

e-ISSN:  2319-724

Call For Paper

VOLUME 06. ISSUE 05 [May 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top