Abstract

Cryptography is the collection of techniques used to hide the information securely from the eavesdroppers during its transmission over the network. Cryptography is centuries old, during the course of time a number of techniques have been proposed and developed by the researchers. Some of these techniques have become popular and widely in use today in a varieties of applications. This paper discusses the two most important categories of techniques symmetric and asymmetric cryptosystems. Keywords: symmetric cryptosystem, asymmetric cryptosystem, secrete key, private key, public key, authentication, confidentiality, integrity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call