Loading

Applications of Public Key Cryptography and Functioning Process
P. Kumaraswamy1, C.V.Guru Rao2, V. Janaki3, Bhandi Bhaskar4

1P. Kumaraswamy, Assistant Professor, Department of Computer Science and Engineering, S R Engineeing College, Warangal, Telangana, India.

2Dr. C. V. Guru Rao, Assistant Professor, Department of Computer Science and Engineering, S R Engineeing College, Warangal, Telangana, India.

3Dr. V. Janaki, Assistant Professor, Department of Computer Science and Engineering, S R Engineeing College, Warangal, Telangana, India.

4Bhandi Bhaskar, Assistant Professor, Department of Computer Science and Engineering, S R Engineeing College, Warangal, Telangana, India.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 26 July 2019 | PP: 480-486 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F11000486S419/19©BEIESP | DOI: 10.35940/ijitee.F1100.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In cryptography, public key cryptography plays an important role to communicate sensitive information in online payment or any other electronic transactions securely. This paper illustrates the major applications of public key cryptography and their functioning process. The real time applications of public key cryptography are also included here.

Keywords: Public Key Cryptography, Encryption, Digital Signature, Certificate, Authentication, Confidentiality, Non-Repudiation.
Scope of the Article: Computer Science and Its Applications