Asymmetric Key Cryptosystem and Digital Signature Algorithm Built on Discrete Logarithm Problem (DLP) Ashish Kumar 1 , Jagadeesh Kakarla 2 , and Muzzammil Hussain 1 1 Department of CSE, Central University of Rajasthan, Kishangarh, Ajmer 305817, India {2016mtcse002,mhussain}@curaj.ac.in 2 Department of CSE, IIITD&M Kancheepuram, Chennai 600127, India jagadeeshk@iiitdm.ac.in Abstract. The thoughts of data security prompt the advancement of Cryptog-raphy. At the end of the day, Cryptography is investigation of keeping data secure. In the advanced mark plot a message can be markedutilizing a secretly held decoding key. Anybody can confirm this mark utilizing the comparing freely uncovered encryption key. Marks cant be fashioned, and an endorser cant later prevent the legitimacy from claiming his mark. This has evident applications in electronic mail and electronic assets exchangeframeworks. Cryptography, notwithstanding give secrecy, authenticity, integrity and non-revocation. The core of cryptography lies in the keys included and mystery of the keys used to encode or decode. Another vital issue is the key size that determines the strength of the key and complexity in executing brute force attack on the texts to recover the key. There have been different cryptographic algorithms suggested. And we give brief overview of mathematical back ground of public key cryptography. A novel the public key scheme and cryptographic signature system has been proposed and the security of system relies on diffi-culty of computing discrete logarithm problem over finite field. Keywords: Cryptography Public key cryptography Brute force Cipher text Digital signature Discrete logarithm problem 1 Introduction Cryptography is a popular way of sending vital information in a secret way. There are many cryptographic techniques available. The state of current information security technique consists of confidentiality, authenticity, integrity, non-repudiation. The security of communication is a crucial issue on World Wide Web. It is about confi- dentiality, integrity, authentication during access or editing of confidential internal documents [1]. Late advances in media communications and PC organizing have carried us into the period of electronic mail. By giving fast and monetary channels to the dispersal of information, electronic mail frameworks are sure to fundamentally lessen our depen-dence on paper as the real medium for exchanges. It is additionally certain that with the © Springer Nature Switzerland AG 2020 A. Abraham et al. (Eds.): ISDA 2018, AISC 940, pp. 401410, 2020. https://doi.org/10.1007/978-3-030-16657-1_37