Comparison of two Public Key Cryptosystems
Authors
Abstract:
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpopular of these algorithms, RSA and ElGamal for key generation and the encryptionscheme (encryption/decryption operation). RSA relies on the difficulty of primefactorization of a very large number, and the hardness of ElGamal algorithm isessentially equivalent to the hardness of finding discrete logarithm modulo a largeprime. These two systems are compared to each other from different parameters pointsof view such as performance, security, speed and applications. To have a goodcomparison and also to have a good level of security correspond to users need thesystems implemented are designed flexibly in terms of the key size.
similar resources
Cryptanalysis of two knapsack public-key cryptosystems
In this paper, we cryptanalyze two knapsack cryptosystems. The first one is proposed by Hwang et al [4], which is based on a new permutation algorithm named Permutation Combination Algorithm. We show that this permutation algorithm is useless to the security of the cryptosystem. Because of the special super increasing structure, we can break this cryptosystem use the method provided by Shamir a...
full textKey-Insulated Public Key Cryptosystems
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...
full textQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
full textMultivariable public-key cryptosystems
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical Society [DL02, Lan01, Lan00a, Lan00b] and in the American Mathematical Monthly [Lan04] excellent expositions on how the theory of multivariable polynomials are used in cryptography. However they covered only half of the story. They covered only the theory of polynomials in symmetric or secret cry...
full textMultivariate Public Key Cryptosystems
As the title says, this book is about Multivariate cryptography. Besides code-, latticeand hash-based cryptosystems, Multivariate cryptography is one of the main fields of cryptosystems which are believed to be secure against attacks with quantum computers. Multivariate cryptography deals with systems of nonlinear polynomial equations in several variables over a finite field which are difficult...
full textQuantum Public-Key Cryptosystems
This paper presents a new paradigm of cryptography, quantum public-key cryptosystems. In quantum public-key cryptosystems, all parties including senders, receivers and adversaries are modeled as quantum (probabilistic) poly-time Turing (QPT) machines and only classical channels (i.e., no quantum channels) are employed. A quantum trapdoor one-way function, f , plays an essential role in our syst...
full textMy Resources
Journal title
volume 3 issue 3
pages 47- 58
publication date 2018-09-01
By following a journal you will be notified via email when a new issue of this journal is published.
Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023