Open Access Open Access  Restricted Access Subscription Access

Overview Of RSA And Its Enhancements


 

In the today’s communication development push the people to transmit their information for so many purposes using the interconnected networks. They are using the internet for credit card payments, tax returns, banking etc. In such a case network security is the very important concept because they have to protect their information from unauthorized users. So people should have to maintain the secrecy of data and also they have to authenticate the information when they transmit data through networks. So cryptography theory is useful for hiding and protecting the information. Cryptography means secret writing which is useful for se cure transmission of information from sender to receiver. Secure communication means the intruder cannot access or modify the message. There are so many cryptographic algorithms to protect our data from malicious users. In which we mainly concentrate on RSA algorithm is an asymmetric algorithm which is a public key cryptography 

Keywords

RSA, security, cryptography, ECC, DES, DS, EAMRSA, Dual RSA. Rebalanced RSA
User
Notifications
Font Size

Abstract Views: 157

PDF Views: 1




  • Overview Of RSA And Its Enhancements

Abstract Views: 157  |  PDF Views: 1

Authors

Abstract


In the today’s communication development push the people to transmit their information for so many purposes using the interconnected networks. They are using the internet for credit card payments, tax returns, banking etc. In such a case network security is the very important concept because they have to protect their information from unauthorized users. So people should have to maintain the secrecy of data and also they have to authenticate the information when they transmit data through networks. So cryptography theory is useful for hiding and protecting the information. Cryptography means secret writing which is useful for se cure transmission of information from sender to receiver. Secure communication means the intruder cannot access or modify the message. There are so many cryptographic algorithms to protect our data from malicious users. In which we mainly concentrate on RSA algorithm is an asymmetric algorithm which is a public key cryptography 

Keywords


RSA, security, cryptography, ECC, DES, DS, EAMRSA, Dual RSA. Rebalanced RSA