Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)

Vulnerabilities in Public Key Cryptography

Authors
Mohamed Abdulla, Muhammad Ehsan Rana
Corresponding Author
Muhammad Ehsan Rana
Available Online 13 September 2021.
DOI
10.2991/ahis.k.210913.079How to use a DOI?
Keywords
Cryptography, Asymmetric Cryptography, Public Key Cryptography, Vulnerabilities, IT Infrastructure Security
Abstract

Cryptography plays a vital role in securing data for IT infrastructure by enabling an adequate level of security to the business. The increased significance of security in the IT infrastructure has raised the demand for public key cryptography. Public key cryptography eliminates the primary concern in private key cryptography, i.e. exchanging the key between the sender and the receiver by having a pair of keys. Public key cryptography enables the exchange of the key even in an unsecured network. After the introduction of public key cryptography, this type of cryptography is the best solution in securing the transmitted data between the sender and the receiver. However, there are vulnerabilities in this type of cryptography that both the sender and the receiver need to know. This research is focused on determining the vulnerabilities of public key cryptography. It also emphasizes how security specialists can overcome these vulnerabilities in public key cryptography.

Copyright
© 2021, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)
Series
Atlantis Highlights in Computer Sciences
Publication Date
13 September 2021
ISBN
978-94-6239-428-5
ISSN
2589-4900
DOI
10.2991/ahis.k.210913.079How to use a DOI?
Copyright
© 2021, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Mohamed Abdulla
AU  - Muhammad Ehsan Rana
PY  - 2021
DA  - 2021/09/13
TI  - Vulnerabilities in Public Key Cryptography
BT  - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)
PB  - Atlantis Press
SP  - 627
EP  - 631
SN  - 2589-4900
UR  - https://doi.org/10.2991/ahis.k.210913.079
DO  - 10.2991/ahis.k.210913.079
ID  - Abdulla2021
ER  -