Survey on Asymmetric Key Cryptographic Algorithms

Authors

  • Sabitha S  Assistant Professor, Department of Information Technology, K R Gouri Amma College of Engineering, Alappuzha, Kerala, India.
  • Binitha V Nair  Assistant Professor, Department of Computer Science and Engineering, K R Gouri Amma College of Engineering, Alappuzha, Kerala, India.

DOI:

https://doi.org//10.32628/IJSRSET207292

Keywords:

RSA cryptosystem, Rabin cryptosystem, Diffie-Hellman cryptosystem, ElGamal cryptosystem, Elliptical curve cryptosystem and digital signature cryptosystem

Abstract

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.

References

  1. Behroz A. Forouzan, “Cryptography & Network Security”, McGraw Hill Publication,2008, New Delhi.
  2. W. Stallings, Cryptography and network security: principles and practices. Prentice Hall, 2005.
  3. W. Diffie and Y. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, pp. 644-654, 1976.
  4. Yaun Xue, “Public key Cryptography and RSA Algorithm”, Technical notes and papers.
  5. W. Diffie, M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography”, in Proceedings IEEE, Vol 67 (3) Mar 1979 pp 397-427
  6. J Menezes Alfred, C Paul, Oorschot van, A Vanstone Scot, Handbook of AppliedCryptography, CRC Press, 1997.
  7. R.L Rivest, A Shamir, L Adleman,” A Method for obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, 21 (1978), 120-126.
  8. T ElGamal,”A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms”, IEEE Transactions on Information Theory, 31 (1985), 469-47.
  9. N. Koblitz, "Elliptic Curve Cryptosystems", Mathematics of Computation, vol. 48, pp. 203-209, 1987

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Sabitha S, Binitha V Nair, " Survey on Asymmetric Key Cryptographic Algorithms, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 7, Issue 2, pp.404-408, March-April-2020. Available at doi : https://doi.org/10.32628/IJSRSET207292