A Comparative Study of RSA and ELGAMAL Cryptosystems
DOI:
https://doi.org/10.47941/ijce.1291Keywords:
RSA, ELGAMAL, Cryptography, algorithms, AsymmetricAbstract
Purpose: In this research, a comparative analysis of the RSA and ELGAMAL algorithms is presented using their encryption and decryption speed with different key sizes. ElGamal and RSA are two popular public-key cryptographic algorithms that depend on the mathematical difficulty of computing discrete logarithms in finite fields and factoring large integers, respectively.
Methodology: In this study, the speed at which messages of various sizes can be encrypted and decrypted using various key sizes is used to gauge how well these algorithms work.
Findings: RSA usually outperforms ElGamal in terms of encryption and decryption speed, according to the results. However, as the key sizes grow, the performance gap between the two algorithms narrows.
Unique Contribution to Theory, Policy and Practice: These findings can aid in selecting the appropriate algorithm and key size for different applications that require secure communication and data encryption.
Downloads
References
Sood, K., Sharma, A., & Khanna, A. (2020). Comparative Analysis of Symmetric and Asymmetric Encryption Algorithms. International Journal of Advanced Research in Computer Science, 11(5), 277-281
Stinson, D. R. (2006). Cryptography: Theory and Practice. CRC Press.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson
Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469-472
Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley
Alizadeh, M., Sadeghi, A. R., & Salmasizadeh, M. (2017). A Comparative Study of RSA and ElGamal Cryptosystems. International Journal of Network Security, 19(3), 357-363.
Liu, W., Zhang, J., & Zhou, J. (2020). A Comparative Study on the Performance of RSA and ElGamal Algorithms in Software and Hardware Implementation. International Journal of Advanced Computer Science and Applications, 11(10), 168-175.
O'Reilly, A., Trappe, W., & Shmatikov, V. (2019). Are RSA and ElGamal secure for hardware? In Proceedings of the 2019 on Great Lakes Symposium on VLSI (pp. 201-20)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal of Computing and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.