A COMPREHENSIVE LITERATURE REVIEW OF ASYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS |
Author(s): |
Vaishali Kanwar |
Keywords: |
Rivest Shamir Adleman (RSA), Diffie-Hellman, Elliptic Curve Cryptography (ECC), Digital Signature Algorithm (DSA), El Gamal, Differences, Comparison. |
Abstract |
Information security and data protection have become extremely important for communication over public channels thus necessitating the use of cryptography to protect communication. Cryptography is a strategy towards assurance a safe transaction between the sender and the receiver. Moreover, only the authorized receiver can have the right to decrypt the information that was sent and encrypted by the sender in this paper, we present a detailed analysis of asymmetric key algorithms. Firstly, this paper presents the basic concepts of Cryptography which are encryption and decryption operations. Secondly, it compares the common asymmetric algorithms Rivest Shamir Adleman (RSA), El-Gamal, Elliptic Curve (ECC). Digital Signature Algorithm DSA, and Diffie Hellman. Our comparison is based on the key size, areas of implementation, and their strengths and weaknesses that affect the running time. |
Other Details |
Paper ID: IJSARTV Published in: Volume : 8, Issue : 11 Publication Date: 11/2/2022 |
Article Preview |
Download Article |