<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 3 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science &amp; Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2015</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>11</Month>
        <Day>30</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Providing Information Security Using Public Key Cryptosystems</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>48</FirstPage>
      <LastPage></LastPage>
      <AuthorList>
        <Author>
          <FirstName>Mr D.Shiva rama krishna</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Mr K.Siva Rama Prasad</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
                    <FirstName>Mr Ch.v.v.Narasimha Raju</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>Information security is main issue of this generation of computing because many types of attacks such as passive and active are increasing day by day. Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, denial of message. It is a general term that can be used regardless of the form the data may providing confidentiality, integrity, and availability of information is is at the heart of information security to provide all these things in this paper we proposed public key cryptosystems. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols based on algorithms that require two separate keys , one of which is secret (or private) and one of which is public. To provide confidentiality, integrity, and availability of information we are using public key cryptosystems such as RSA algorithm, Elliptic curve cryptography, Diffie-Hellman key exchange algorithm and Digital Signatures</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>RSA, Diffie-Hellman, Digital Signatures, Elliptic curve cryptography</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=197</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>