Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hong, T. W.
- A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms
Abstract Views :136 |
PDF Views:0
Authors
T. W. Hong
1,
S. G. Miller
1
Affiliations
1 Department of Computer Science, Wayne State University, Detroit, MI 48202, US
1 Department of Computer Science, Wayne State University, Detroit, MI 48202, US
Source
Networking and Communication Engineering, Vol 11, No 10 (2019), Pagination: 167-170Abstract
Asymmetric key encryption is using the RSA algorithm. Swapping of data one to another by using the public-private key pair. Whereas Diffie-Hellman algorithm is used for key exchange using the perception of primitive ischolar_main. Symmetric key encryption is used to equally both the users and common key for consequent data-exchange. Cybercrime is used to protected our messages and data are connected with network security. In order to converse over a computer network, the cryptography system is intended. The sender sending an encrypted message to the beneficiary.