Survey on Asymmetric Key Cryptographic Algorithms
DOI:
https://doi.org/10.32628/IJSRSET207292Keywords:
RSA cryptosystem, Rabin cryptosystem, Diffie-Hellman cryptosystem, ElGamal cryptosystem, Elliptical curve cryptosystem and digital signature cryptosystemAbstract
Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.
References
- Behroz A. Forouzan, “Cryptography & Network Security”, McGraw Hill Publication,2008, New Delhi.
- W. Stallings, Cryptography and network security: principles and practices. Prentice Hall, 2005.
- W. Diffie and Y. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, pp. 644-654, 1976.
- Yaun Xue, “Public key Cryptography and RSA Algorithm”, Technical notes and papers.
- W. Diffie, M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography”, in Proceedings IEEE, Vol 67 (3) Mar 1979 pp 397-427
- J Menezes Alfred, C Paul, Oorschot van, A Vanstone Scot, Handbook of AppliedCryptography, CRC Press, 1997.
- R.L Rivest, A Shamir, L Adleman,” A Method for obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, 21 (1978), 120-126.
- T ElGamal,”A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms”, IEEE Transactions on Information Theory, 31 (1985), 469-47.
- N. Koblitz, "Elliptic Curve Cryptosystems", Mathematics of Computation, vol. 48, pp. 203-209, 1987
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.