Comparison of two Public Key Cryptosystems

Publish Year: 1397
نوع سند: مقاله ژورنالی
زبان: English
View: 35

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JOPN-3-3_005

تاریخ نمایه سازی: 25 بهمن 1402

Abstract:

Since the time public-key cryptography was introduced by Diffie andHellman in ۱۹۷۶, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpopular of these algorithms, RSA and ElGamal for key generation and the encryptionscheme (encryption/decryption operation). RSA relies on the difficulty of primefactorization of a very large number, and the hardness of ElGamal algorithm isessentially equivalent to the hardness of finding discrete logarithm modulo a largeprime. These two systems are compared to each other from different parameters pointsof view such as performance, security, speed and applications. To have a goodcomparison and also to have a good level of security correspond to users need thesystems implemented are designed flexibly in terms of the key size.

Authors

mahnaz mohammadi

Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran

alireza zolghadr

Faculty of Computer and Electrical Eng., Department of Communication and Electronics, Shiraz University, Shiraz, Iran

mohammad pourmina

Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. William, Cryptography and Network Security Principles and Practice, ۷th ...
  • JS. Coron, T. Holenstein, R. Künzler, et al., How to ...
  • I. Mironov, O. Pandey, O. Reingold, Gil Segev, Incremental Deterministic ...
  • P. K. Panda, S. Chattopadhyay, A hybrid security algorithm for ...
  • S. B. Sadkhan, F. H. Abdulraheem, A proposed ANFIS evaluator ...
  • F. Mo, Y. C. Hsu, H. H. Chang, S. C. ...
  • Y. Jitarwal, P. K. Mangal, S. K. Suman, Enhancement of ...
  • T. H. Cormen, C. E. Lieserson, R. L. Rivest, Introduction ...
  • A. J. Menezes, P.van Oorschot, S. A. Vanstone, Handbook of ...
  • B. Schneier, Applied cryptography: protocols, algorithms, and source code in ...
  • P. Ribenboim, The Book of Prime Number Records, ۲nd ed., ...
  • J. H. Seo, , Short Signatures from Diffie–Hellman: Realizing Almost ...
  • A. Ara, M. Al-Rodhaan, Y. Tian, A. Al-Dhelaan. A Secure ...
  • Y. Murakami, M. Kasahara, Hybrid inter-organization cryptosystem using ElGamal cryptosystem, ...
  • نمایش کامل مراجع