Panjab University Research Journal (Science)
| Home | Editorial Board | Advisory Board | Current Issue | Archive | Instructions to Authors | Subscription | Contact Us |
 

CRYPTOGRAPHIC TECHNIQUES

ABSTRACTS OF THE PAPERS APPEARING IN VOLUME 54(2004)
 
Pushpa R. Suri1, Renu Vig2 and Shalini Vermani*1
1. Department of Computer Science and Applications, Kurukshetra University, Kurukshetra *Correspondence Author : s vermani s@yahoo.com
2. Department of Telecommunication and Information Technology, University Institute of Engineering and Technology, Panjab University, Chandigarh 160 014


Abstract
In this paper, some of the cryptographic techniques have been studied. We start with a brief description of the traditional cryptography also known as symmetric key method. The rest of the paper takes up public key cryptography first studied by Diffie-Hellman. Other cryptosystems using public key discussed here include ElGamal encryption and RSA. Some of the possible attacks on RSA are also discussed. Finally Kerberos method using public key is discussed.

Key words: Decryption, digital signature, encryption, public key, symmetric key.
 
 
E-mail: rksingla@pu.ac.in
Copyright 2004, All Rights Reserved by Panjab University Research Journal (Science)
Developed & Designed by Anil Kumar Sharma