2022
DOI: 10.35444/ijana.2022.iccmeapaper06
|View full text |Cite
|
Sign up to set email alerts
|

A Note on Public Key Cryptosystems

Abstract: Public key or asymmetric cryptosystems use public-private key pair for the secure transmission of data. RSA and ECC (Elliptic Curve Cryptography/Cryptosystems) are widely used cryptosystems in this category. Public key cryptosystems rely on mathematical problems known as hard problems. The security of these cryptosystems is based on these hard problems. Public key cryptosystems solve the key transportation problem of symmetric key cryptosystems and able to provides digital signatures also.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The McEliece public key cryptosystem was first proposed by Robert J. McEliece in 1978 8 . In addition to its high security properties, the Classic McEliece scheme exhibits low computational complexity for both the encryption and decryption processes, enabling efficient implementation on software and hardware platforms 9 . The encryption process of the Classic McEliece cryptosystem is shown in Figure 1.…”
Section: Pqc Classic Mceliece Algorithmmentioning
confidence: 99%
“…The McEliece public key cryptosystem was first proposed by Robert J. McEliece in 1978 8 . In addition to its high security properties, the Classic McEliece scheme exhibits low computational complexity for both the encryption and decryption processes, enabling efficient implementation on software and hardware platforms 9 . The encryption process of the Classic McEliece cryptosystem is shown in Figure 1.…”
Section: Pqc Classic Mceliece Algorithmmentioning
confidence: 99%