A Comparative Study of RSA and ELGAMAL Cryptosystems

Authors

  • Paul K. Arhin Jnr University of Cape Coast, Cape Coast, Ghana
  • Prof. Michael Asante Kwame Nkrumah University of Science and Technology Kumasi, Ghana
  • Linda Otoo University of Cape Coast, Cape Coast, Ghana

DOI:

https://doi.org/10.47941/ijce.1291

Keywords:

RSA, ELGAMAL, Cryptography, algorithms, Asymmetric

Abstract

Purpose: In this research, a comparative analysis of the RSA and ELGAMAL algorithms is presented using their encryption and decryption speed with different key sizes. ElGamal and RSA are two popular public-key cryptographic algorithms that depend on the mathematical difficulty of computing discrete logarithms in finite fields and factoring large integers, respectively.

Methodology: In this study, the speed at which messages of various sizes can be encrypted and decrypted using various key sizes is used to gauge how well these algorithms work.

Findings: RSA usually outperforms ElGamal in terms of encryption and decryption speed, according to the results. However, as the key sizes grow, the performance gap between the two algorithms narrows.

Unique Contribution to Theory, Policy and Practice: These findings can aid in selecting the appropriate algorithm and key size for different applications that require secure communication and data encryption.

Downloads

Download data is not yet available.

Author Biographies

Paul K. Arhin Jnr, University of Cape Coast, Cape Coast, Ghana

Assistant Lecturer: Dept. of Computer Science and I.T

Prof. Michael Asante, Kwame Nkrumah University of Science and Technology Kumasi, Ghana

Associate Professor: Dept. of Computer Science

Linda Otoo, University of Cape Coast, Cape Coast, Ghana

Assistant Lecturer: Dept. of Computer Science and I.T

References

Sood, K., Sharma, A., & Khanna, A. (2020). Comparative Analysis of Symmetric and Asymmetric Encryption Algorithms. International Journal of Advanced Research in Computer Science, 11(5), 277-281

Stinson, D. R. (2006). Cryptography: Theory and Practice. CRC Press.

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson

Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126

ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469-472

Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley

Alizadeh, M., Sadeghi, A. R., & Salmasizadeh, M. (2017). A Comparative Study of RSA and ElGamal Cryptosystems. International Journal of Network Security, 19(3), 357-363.

Liu, W., Zhang, J., & Zhou, J. (2020). A Comparative Study on the Performance of RSA and ElGamal Algorithms in Software and Hardware Implementation. International Journal of Advanced Computer Science and Applications, 11(10), 168-175.

O'Reilly, A., Trappe, W., & Shmatikov, V. (2019). Are RSA and ElGamal secure for hardware? In Proceedings of the 2019 on Great Lakes Symposium on VLSI (pp. 201-20)

Downloads

Published

2023-05-29

How to Cite

Arhin Jnr, P. K. ., Asante, M. ., & Otoo, L. . (2023). A Comparative Study of RSA and ELGAMAL Cryptosystems. International Journal of Computing and Engineering, 4(1), 33–41. https://doi.org/10.47941/ijce.1291

Issue

Section

Articles