Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms


Affiliations
1 Department of Computer Science, Wayne State University, Detroit, MI 48202, United States
     

   Subscribe/Renew Journal


Asymmetric key encryption is using the RSA algorithm. Swapping of data one to another by using the public-private key pair. Whereas Diffie-Hellman algorithm is used for key exchange using the perception of primitive ischolar_main. Symmetric key encryption is used to equally both the users and common key for consequent data-exchange. Cybercrime is used to protected our messages and data are connected with network security. In order to converse over a computer network, the cryptography system is intended. The sender sending an encrypted message to the beneficiary.


Keywords

Cryptography, Diffie Hellman, Network Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 137

PDF Views: 0




  • A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms

Abstract Views: 137  |  PDF Views: 0

Authors

T. W. Hong
Department of Computer Science, Wayne State University, Detroit, MI 48202, United States
S. G. Miller
Department of Computer Science, Wayne State University, Detroit, MI 48202, United States

Abstract


Asymmetric key encryption is using the RSA algorithm. Swapping of data one to another by using the public-private key pair. Whereas Diffie-Hellman algorithm is used for key exchange using the perception of primitive ischolar_main. Symmetric key encryption is used to equally both the users and common key for consequent data-exchange. Cybercrime is used to protected our messages and data are connected with network security. In order to converse over a computer network, the cryptography system is intended. The sender sending an encrypted message to the beneficiary.


Keywords


Cryptography, Diffie Hellman, Network Security.