Downloads

Asymmetric key algorithms-A Proposed Method

Authors

MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay1

Abstract

Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.

Article Details

Published

2017-05-02

Section

Articles

How to Cite

Asymmetric key algorithms-A Proposed Method. (2017). International Journal of Engineering and Computer Science, 6(5). https://ijecs.in/index.php/ijecs/article/view/3217