scholarly journals Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password

2014 ◽  
Vol 85 (11) ◽  
pp. 28-32
Author(s):  
Harinandan Tunga ◽  
Akash Ghosh ◽  
Arnab Saha ◽  
Swashata Ghosh
Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


Sign in / Sign up

Export Citation Format

Share Document