TY - JOUR AU - Eseyin, Joseph B. AU - Gbolagade, Kazeem A. PY - 2019/07/20 TI - An Overview of Public Key Cryptosysems and Application of Residue Number System JF - KIU Journal of Humanities; Vol 4 No 2 (2019): KIU Journal of Humanities, Vol. 4 No. 2, June 2019 KW - N2 - The rapid growth in wireless communication system, personal communication system, and smart card technology in our society makes information more susceptible to abuse. The content of the communication may be exposed to an eavesdropper, or system services can be used deceptively. It is vital that these information systems are made secure before these systems are deployed broadly in society.  The increasing problem of contraventions in information security has created a demand for serious efforts towards ensuring security of data and information in electronic system communications. The use of these electronic systems for e-commerce, Internet banking, government online services, mobile commerce, Public Key Infrastructure, etc., is dependent on the efficiency of the security solutions. These security concerns are further heightened when resource-constrained environments and real-time speed requirements have to be considered in IT applications. Consequently, these IT security issues have been a subject of intensive research in areas of computing, networking and cryptography. This paper presents the review of public key cryptosystems and application of residue number system.  This public key cryptosystem can be used in wide range of electronic devices, such as Personal Computers, wireless handsets, smart cards, hardware security modules, network appliances, such as routers, gateways, firewalls, and storage and web servers. This paper will examine into details public key cryptography and residue number systems and its application in securing data and information. Keywords: Public key cryptography, Residue Number Systems, Data Security, Data encryption, Data decryption. UR - https://ijhumas.com/ojs/index.php/kiuhums/article/view/546