A Survey of Different Public-Key Cryptosystems
نویسندگان
چکیده
Cryptography is the study of techniques which is used to communicate, store in forma tion or data securely, without being intercepted by third parties. In the real world, there are so many organizations working on large databases over a public network. The security of data is the primary concern in the public network. Encryption is the mos t commonly used technique where transactions continuously take p lace between the users. Other cryptography techniques like dig ital time -stamping, dig ital signature, digital certificates etc., are also used for security purpose. In this paper, we have compa red four Public -Key cryptosystem i.e. RSA, Diffie -Hellman Key Exchange, Elgamal Cryptographic System, and Elliptical Curve Cryptography. This paper performs security analysis of the above public key cryptosystem and concluded that ECC is the most efficient public-key cryptosystem. It provides high security solutions that do not impact performance even on constrained devices where storage, computing power and bandwidth are limited such as PDAs and cell phones.
منابع مشابه
Comparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملA survey of key evolving cryptosystems
This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: ‘forward security’ and ‘intrusion resilience’. The essential feature of this design strategy is that the secret key changes over time, while the corresponding public key remains unchanged. Key evolving cryptosystems can limit the damage caused by an attacker who occasionally le...
متن کاملA Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems
Public-key cryptosystems are one of the basic building blocks of modern cryptographic systems. Therefore, it is important that they allow to be implemented resistant to several types of side-channel attacks. In this survey paper, we give an overview of the possible vulnerabilities of implementations of public-key cryptosystems that have been submitted to the NESSIE project and we additionally d...
متن کاملBraid Group Cryptography
In the last decade, a number of public key cryptosystems based on combinatorial group theoretic problems in braid groups have been proposed. We survey these cryptosystems and some known attacks on them. This survey includes: Basic facts on braid groups and on the Garside normal form of its elements, some known algorithms for solving the word problem in the braid group, the major public-key cryp...
متن کامل