Pushpa R. Suri1, Renu Vig2 and Shalini Vermani*1
1. Department of Computer Science and Applications, Kurukshetra University, Kurukshetra
*Correspondence Author : s vermani firstname.lastname@example.org
2. Department of Telecommunication and Information Technology, University Institute of Engineering and Technology, Panjab University, Chandigarh 160 014
In this paper, some of the cryptographic techniques have been studied. We start with a brief description of the traditional cryptography also known as symmetric key method. The rest of the paper takes up public key cryptography first studied by Diffie-Hellman. Other cryptosystems using public key discussed here include ElGamal encryption and RSA. Some of the possible attacks on RSA are also discussed. Finally Kerberos method using public key is discussed.
Key words: Decryption, digital signature, encryption, public key, symmetric key.