Information security is main issue of this generation of computing because many types of attacks such as passive and active are increasing day by day. Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, denial of message. It is a general term that can be used regardless of the form the data may providing confidentiality, integrity, and availability of information is is at the heart of information security to provide all these things in this paper we proposed public key cryptosystems. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols based on algorithms that require two separate keys , one of which is secret (or private) and one of which is public. To provide confidentiality, integrity, and availability of information we are using public key cryptosystems such as RSA algorithm, Elliptic curve cryptography, Diffie-Hellman key exchange algorithm and Digital Signatures
Keywords
RSA, Diffie-Hellman, Digital Signatures, Elliptic curve cryptography