Comparison of two Public Key Cryptosystems

Authors

  • alireza zolghadr Faculty of Computer and Electrical Eng., Department of Communication and Electronics, Shiraz University, Shiraz, Iran
  • mahnaz mohammadi Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran
  • mohammad pourmina Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran
Abstract:

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpopular of these algorithms, RSA and ElGamal for key generation and the encryptionscheme (encryption/decryption operation). RSA relies on the difficulty of primefactorization of a very large number, and the hardness of ElGamal algorithm isessentially equivalent to the hardness of finding discrete logarithm modulo a largeprime. These two systems are compared to each other from different parameters pointsof view such as performance, security, speed and applications. To have a goodcomparison and also to have a good level of security correspond to users need thesystems implemented are designed flexibly in terms of the key size.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Cryptanalysis of two knapsack public-key cryptosystems

In this paper, we cryptanalyze two knapsack cryptosystems. The first one is proposed by Hwang et al [4], which is based on a new permutation algorithm named Permutation Combination Algorithm. We show that this permutation algorithm is useless to the security of the cryptosystem. Because of the special super increasing structure, we can break this cryptosystem use the method provided by Shamir a...

full text

Key-Insulated Public Key Cryptosystems

Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...

full text

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

full text

Multivariable public-key cryptosystems

Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical Society [DL02, Lan01, Lan00a, Lan00b] and in the American Mathematical Monthly [Lan04] excellent expositions on how the theory of multivariable polynomials are used in cryptography. However they covered only half of the story. They covered only the theory of polynomials in symmetric or secret cry...

full text

Multivariate Public Key Cryptosystems

As the title says, this book is about Multivariate cryptography. Besides code-, latticeand hash-based cryptosystems, Multivariate cryptography is one of the main fields of cryptosystems which are believed to be secure against attacks with quantum computers. Multivariate cryptography deals with systems of nonlinear polynomial equations in several variables over a finite field which are difficult...

full text

Quantum Public-Key Cryptosystems

This paper presents a new paradigm of cryptography, quantum public-key cryptosystems. In quantum public-key cryptosystems, all parties including senders, receivers and adversaries are modeled as quantum (probabilistic) poly-time Turing (QPT) machines and only classical channels (i.e., no quantum channels) are employed. A quantum trapdoor one-way function, f , plays an essential role in our syst...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 3  issue 3

pages  47- 58

publication date 2018-09-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023