DocumentCode
3774355
Title
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap
Author
Juliet N. Gaithuru;Majid Bakhtiari;Mazleena Salleh;Alwuhayd M. Muteb
Author_Institution
Faculty of Computing, Universiti Teknologi Malaysia, 81310, Skudai, Johor Bahru, Malaysia
fYear
2015
Firstpage
236
Lastpage
244
Abstract
Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 1976 till the present day. This paper provides a description of their encryption and decryption operations, points out their security basis, areas of implementation, their strengths and weaknesses during operation. Finally, the paper pinpoints the existing gap based on conclusions drawn from the review, with particular emphasis on an algorithm most suited for industrial application given the current trends in cryptography towards quantum computing. This paper then narrows down on the earnest need for an algorithm that has no trade-off in encryption and decryption speeds, has low computation overhead and is secure enough to withstand quantum algorithm attacks.
Keywords
"Encryption","Elliptic curve cryptography","Electronic mail"
Publisher
ieee
Conference_Titel
Software Engineering Conference (MySEC), 2015 9th Malaysian
Print_ISBN
978-1-4673-8226-7
Type
conf
DOI
10.1109/MySEC.2015.7475227
Filename
7475227
Link To Document