Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

A COMPREHENSIVE LITERATURE REVIEW OF ASYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS

Author(s):

Vaishali Kanwar

Keywords:

Rivest Shamir Adleman (RSA), Diffie-Hellman, Elliptic Curve Cryptography (ECC), Digital Signature Algorithm (DSA), El Gamal, Differences, Comparison.

Abstract

Information security and data protection have become extremely important for communication over public channels thus necessitating the use of cryptography to protect communication. Cryptography is a strategy towards assurance a safe transaction between the sender and the receiver. Moreover, only the authorized receiver can have the right to decrypt the information that was sent and encrypted by the sender in this paper, we present a detailed analysis of asymmetric key algorithms. Firstly, this paper presents the basic concepts of Cryptography which are encryption and decryption operations. Secondly, it compares the common asymmetric algorithms Rivest Shamir Adleman (RSA), El-Gamal, Elliptic Curve (ECC). Digital Signature Algorithm DSA, and Diffie Hellman. Our comparison is based on the key size, areas of implementation, and their strengths and weaknesses that affect the running time.

Other Details

Paper ID: IJSARTV
Published in: Volume : 8, Issue : 11
Publication Date: 11/2/2022

Article Preview




Download Article