Title: Asymmetric key algorithms-A Proposed Method

Author(s): MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay


Dept. of Computer Sc. & Engineering, University of Calcutta, Kolkata, India

             


Abstract

Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.


License: This work is licensed under a Creative Commons Attribution 4.0 International License.

 

Website: http://www.ijecs.in

e-ISSN:  2319-724

GettyImages.pngace.pngajdh.pngarx.pngcit.pngcomp.pngcross.pngicn.pngino.pnglogo_wcmasthead_en.pngres.pngresbib.pngsci.pngscic.pngscics.pngsearch_logo.gifulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top