Comparative Study Between RSA Algorithm and Its Variants: Inception to Date

dc.contributor.authorRathod, U.
dc.contributor.authorSreenivas, S.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:36:26Z
dc.date.issued2021
dc.description.abstractRSA Public Key Cryptography (PKC) otherwise called asymmetric encryption, comprises of two keys known as public key and private key. While the sender utilizes receiver’s public key to encrypt the message, the receiver’s private key is utilized for decrypting the message, so there is no compelling reason to share a private key as in symmetric cryptography which requires sharing a private key. This paper means to investigate RSA and its variants, study its qualities and shortcomings, and propose inventive answers for conquer the shortcoming. RSA is extraordinary compared to other asymmetric key cryptographic algorithms in correspondence over systems. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
dc.identifier.citationLecture Notes in Electrical Engineering, 2021, Vol.698, , p. 139-149
dc.identifier.issn18761100
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_14
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/30468
dc.publisherSpringer Science and Business Media Deutschland GmbH info@springer-sbm.com
dc.subjectCryptography
dc.subjectDecryption
dc.subjectEncryption
dc.subjectFactorization
dc.subjectPrime numbers
dc.subjectPrivate key
dc.subjectPublic key
dc.subjectRSA
dc.titleComparative Study Between RSA Algorithm and Its Variants: Inception to Date

Files