Comparative Study Between RSA Algorithm and Its Variants: Inception to Date

dc.contributor.authorRathod U.
dc.contributor.authorSreenivas S.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:15:39Z
dc.date.available2021-05-05T10:15:39Z
dc.date.issued2021
dc.description.abstractRSA Public Key Cryptography (PKC) otherwise called asymmetric encryption, comprises of two keys known as public key and private key. While the sender utilizes receiver’s public key to encrypt the message, the receiver’s private key is utilized for decrypting the message, so there is no compelling reason to share a private key as in symmetric cryptography which requires sharing a private key. This paper means to investigate RSA and its variants, study its qualities and shortcomings, and propose inventive answers for conquer the shortcoming. RSA is extraordinary compared to other asymmetric key cryptographic algorithms in correspondence over systems. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 139 - 149en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_14
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/14675
dc.titleComparative Study Between RSA Algorithm and Its Variants: Inception to Dateen_US
dc.typeConference Paperen_US

Files