Downloads
Asymmetric key algorithms-A Proposed Method
Authors
Abstract
Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.
Article Details
Published
2017-05-02
Issue
Section
Articles
How to Cite
Asymmetric key algorithms-A Proposed Method. (2017). International Journal of Engineering and Computer Science, 6(5). http://www.ijecs.in/index.php/ijecs/article/view/3217