Vulnerabilities in Public Key Cryptography
- DOI
- 10.2991/ahis.k.210913.079How to use a DOI?
- Keywords
- Cryptography, Asymmetric Cryptography, Public Key Cryptography, Vulnerabilities, IT Infrastructure Security
- Abstract
Cryptography plays a vital role in securing data for IT infrastructure by enabling an adequate level of security to the business. The increased significance of security in the IT infrastructure has raised the demand for public key cryptography. Public key cryptography eliminates the primary concern in private key cryptography, i.e. exchanging the key between the sender and the receiver by having a pair of keys. Public key cryptography enables the exchange of the key even in an unsecured network. After the introduction of public key cryptography, this type of cryptography is the best solution in securing the transmitted data between the sender and the receiver. However, there are vulnerabilities in this type of cryptography that both the sender and the receiver need to know. This research is focused on determining the vulnerabilities of public key cryptography. It also emphasizes how security specialists can overcome these vulnerabilities in public key cryptography.
- Copyright
- © 2021, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Mohamed Abdulla AU - Muhammad Ehsan Rana PY - 2021 DA - 2021/09/13 TI - Vulnerabilities in Public Key Cryptography BT - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) PB - Atlantis Press SP - 627 EP - 631 SN - 2589-4900 UR - https://doi.org/10.2991/ahis.k.210913.079 DO - 10.2991/ahis.k.210913.079 ID - Abdulla2021 ER -