- Cite This Article as
The ever increasing technologies with parallel advancements in the development of notorious attempts, to play with the integrity of the information, in the field of communication over the internet present the need for the equally enhancing security measures. We here, try to analyze the security steps and related phenomena which have been developed specific to the symmetric cryptosystems. With the application of different protocols and their related drawbacks, we try to introduce a few changes, if possible, without diminishing the essence of such protocols. Our attempt is to look for the possibility of introducing asymmetric cryptosystem security measures to meet our purpose. The works already being done are a source of reference to invoke something inquisitive towards our topic. Such works include techniques such as key management, magic rectangle, hash functions, encrypted key exchange, etc.
- Hardik Gandhi, Vinit Gupta, “Research on enhancing public key by the use of MRGA with RSA and N-Prime RSA” paper published by “International Journal for Innovative Research in Science & Technology”, Volume 1, Issue 12, May 2015.
- Jyotirmoy Das, “A Study on Modern Cryptography and their Security Issues” published by “International Journal of Emerging Technology and Advanced Engineering”, Volume 4, Issue 10, October 2014.
- Mitali, Vijay Kumar, Arvind Sharma, “A Survey on Various Cryptography Techniques” published by “International Journal of Emerging Trends & Technology in Computer Science” Volume 3, Issue 4, July-August 2014.
- Swati Kashyap, Er. Neeraj Madan, “A Review on: Network Security and Cryptographic Algorithm” published by “International Journal of Advanced Research in Computer Science and Software Engineering” Volume 5, Issue 4, April 2015
[Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg and Shudhanshu Yadav (2017); PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. Int. J. of Adv. Res. 5 (2). 722-724] (ISSN 2320-5407). www.journalijar.com
Article DOI: 10.21474/IJAR01/3207 DOI URL: http://dx.doi.org/10.21474/IJAR01/3207
Share this article
This work is licensed under a Creative Commons Attribution 4.0 International License.