A Survey On Cryptography Comparative Study Between RSA Vs ECC Algorithms and RSA Vs El-Gamal Algorithms
A Survey On Cryptography Comparative Study Between RSA Vs ECC Algorithms and RSA Vs El-Gamal Algorithms
Abstract—Internet security and data protection should be regarding other attributes. The main objectives of cryptography
guaranteed for all users. Therefore, security is a major concern are confidentiality, authentication, integrity, Non repudiation,
when exposing information to networks. In todays world, the access control, and availability. RSA and ECC , El-Gamal are
information is never enough protected the way it should be. Cryp-
tography is one of the most effective and efficient components of of the most famous techniques used to perform encryption
network security. Cryptography is a technique to apply ensure and decryption. These techniques have different key sizes,
the secure and reliable transaction between the sender and the and eventually different execution time. In the present pa-
receiver when transferring unintelligible information. Moreover, per we propose to present three majors algorithms used for
only the authorized receiver can have the right to decrypt the cryptography. Note that, we introduce the main concepts used
information that was sent and encrypted by the sender. The
cryptography plays an essential role in order to provide security in cryptography, the remainder of this paper is organized as
to these networks. In this paper, we observe encryption as well follows: in the second section, we introduce and compare
as decryption time of different algorithms with the random size between El-gamal algorithm and RSA. In the third section,
of data packets. Firstly, this work introduces the fundamental we introduce elliptic curve algorithm and we compare it with
concepts of Cryptography: encryption and decryption operations. RSA. Finally, we discuss results and we conclude.
Secondly, compares between the most popular algorithms RSA ,
El-Gamal and Elliptic Curve (ECC). Our comparison is based on A. Cryptography
key size length that affects the running time. Finally, we conclude
our survey by focusing on the different outcomes between the Cryptography is simply hiding information in a systematic
RSA and Elliptic curve algorithms. manner such that only authorized parties to have access to
Index Terms—Encryption, decryption, asymmetric key, sym- the right information. Doing so can be considered as an art,
metric key, cryptography, RSA, Elliptic Curve.
but it is a science. Cryptosystem broadly classified into two
major categories, first is symmetric (Figure 1) and other is
I. I NTRODUCTION
asymmetric (Figure 2) based on the concepts of the key.
Cryptography [1] [2], is a technique to store and transmit
data in a particular format in a way only intended users B. Concepts Used in Cryptography
can read and process. The encryption of the data prevents The following paragraph is a description of some of the
attackers from reading private messages. Electronic security concepts used in cryptography [5].
was becoming more and more essential as the Internet, and Encryption: The process of encoding plain text messages into
other media devices become more pervasive. Cryptography ciphertext messages is called encryption.
is a security tool utilized to secure email messages, Credit Decryption: The reverse process of transforming ciphertext
Card data [3], corporate information, and any relevant data messages back to plain text is called decryption.
transmitted through all types of media and the various fields Plain Text: The raw communication written or said in any
like wired networks and wireless networks. The cryptography human language. It takes the form of plain text. It is read
is classified into two major categories: Symmetric Key Sys- and understood or heard and understood by the sender, the
tems and Asymmetric Key Systems, but it can be classified recipient, or by any other third party that can access that
174
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 28,2023 at 06:26:47 UTC from IEEE Xplore. Restrictions apply.
• Divide B into blocks: 1 block is enough
• Compute encrypted block C = M ∧ e mod n:
C = 23 ∧ 5 mod 35 = 6436343 mod 35 = 18 The ciphertext
C represented in number is 18 With the private key of 35,
29, decryption of the cipher text C represented as number
18 can be illustrated as: Given private key n,e as 35,29 Given
ciphertext C represented in number as 18 Divide C into blocks:
1 block is enough Compute encrypted block:
M = C ∧ d mod n :
M = 18 ∧ 29mod35 = 18 ∗ 18 ∧ 28 mod 35
= 18 ∗ (18 ∧ 4) ∧ 7 mod 35 Fig. 3. Three adding cases in an elliptic curve
= 18 ∗ (104976) ∧ 7mod35
= 18 ∗ (104976 mod 35)∧ mod 35
= 18 ∗ (11) ∧ 7 mod 35 random number is used. Also analysis showed another major
= 18 ∗ 19487171 mod 35 disadvantage: the cipher text is twice as long as the plaintext.
= 350769078 mod 35 El-Gamal Algorithm is comparable to RSA as showed in
= 23 Table2.
The clear text M represented in number is 23.
TABLE I
III. EL-GAMAL ALGORITHM S UMMARY TABLE O N S YMMETRIC A LGORITHMS O F RSA A ND
E L -G AMAL
The El-Gamal algorithm [10] is known as a asymmetric
S.NO Factors RSA El-Gamal
cryptosystem. It is so powerful in terms of encrypting and 1 Developed 1978 1985
decrypting. This algorithm present the same form in order to 2 Key Length >1024 bits 1024 bits
encrypt within the public key and private key environment. Value
3 Type of Algo- Asymmetric Asymmetric
Therefore, encryption is not the same as signature verifica- rithm
tion. signature creation depends on the El-Gamal signature 4 Security Timing Attack Meet-in-The
algorithm. The main disadvantage of El-Gamal is the need for Attacks middle Attack
randomness, and its slower speed (especially for encrypting 5 Simulation Fast Fast
Speed
and decrypting).the main disadvantage that present o El-Gamal 6 Scalability No Scalability Good scalabil-
algorithm is that the use expensing the message by one or occurs ity
two factors, which take place during encryption. Consequently, 7 Key Used Different Different
key used key used
such message expansion is negligible if the cryptosystem is for Encrypt for Encrypt
used only for exchange of secret keys El-Gamal encryption. and Decrypt and Decrypt
Process Process
IV. COMPARISON EL-GAMAL ALGORITHM AND 8 Power High Low
RSA Consumptin
9 Hardware and Not very effi- Faster and effi-
El-Gamal is not semantically secure. El-Gamal algorithms Software Im- cient cient
[10] can not only be used in data encryption, but in digital plementation
signature and the security relies on the problem of divergence
logarithm in finite domains. Firstly, choose a prime number
p, and two random number g, x, where g < p and x < p, V. ELEPTIC CURVE ALGORITHM
calculate Y = g ∧ x( mod p) , of which y, g, and p are Neal Koblitz and Victor S. Miller independently introduced
the public Comparison of El-Gamal and RSA algorithms has Elliptic Curve cryptography in 1985 and 1987 [13]. Elliptic
been done on the basis of security and time consumption for curve cryptography transforms a mathematical problem in to
encryption and decryption. This paper analyze that ElGamal an EE applicable computer algorithm. In general, public key
algorithm is more secure as compared to RSA algorithm cryptography brings the complex problem into a cryptosystem.
because it generates more complex cipher text and it was also Elliptic Curve cryptography (ECC) [14] is based upon the
slow because when we encrypt and decrypt it, it generates algebraic structure of elliptic curves over a finite field. Figure
more than one public keys. The research in this paper [11] 3 represents different illustrations of an elliptic curve.
presents the problem that ElGamal digital signature security Example 2: (p = 7, n = 2, a = 1, b = 6)
is constantly being challenged and increasingly becomes iseri- y 2 = x3 + x + 6
ous, an improved ElGamal comparison is proposed. Although, (Note:4 + 27 ∗ 36 = 976 = 3 mod7)
ElGamal algorithm is considered secure and reliable [12] There are 49 integer points on this “curve”
and It has the advantage of making the same plaintext that Ex: (3, 6) → 3 ∧ 3 + 3 + 6 = 36 mod 7 = 1 = 6 ∧ 2 mod 7
gives a different cipher text, each time it is encrypted. But it (4, 2) → 4 ∧ 3 + 4 + 6 = 74 mod 7 = 4 = 22 mod 7
has its own disadvantages. The main problem that only one (6, 5) → 6 ∧ 3 + 6 + 6 = 228 mod 7 = 4 = 52 mod 7
175
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 28,2023 at 06:26:47 UTC from IEEE Xplore. Restrictions apply.
Points on the “curve” for which there are solutions: reduced in ECC. The result shows the performance of ECC
(1, 1), (1, 6), (2, 3), (2, 4), (3, 1), (3, 6), (4, 2), (4, 5), (6, 2), (6, 5) that are useful. We have surveyed these algorithms security
Note: (3, 1), (2, 3), (6, 2) are on the same line. because they are mostly used.
y = 2x + 7, y = x/3 are the same line
R EFERENCES
(7 mod 7 = 0, 1/3 is the inverse of 3 which is - 2).
[1] W. Stallings, Network Security Essentials - Applications and Standards
VI. COMPARISON BETWEEN ECC AND RSA (4. ed., internat. ed.). Pearson Education, 2010.
ALGORITHMS [2] A. Kahate, Cryptography and Network Security. Mc-
Graw Hill Education, 2013. [Online]. Available:
The primary advantage of the RSA algorithm is the use of https://books.google.com.sa/books?id=xCDZAgAAQBAJ
[3] P. S. S. H. Vikrant M. Adki, “A survey on cryptography techniques,”
a private key, which is not transmitted with the encrypted text, International Journal of Advanced Research in Computer Science and
which makes it impossible to be known by the hacker. Also, Software Engineering, 2016.
providing a digital signature by the public key in RSA give [4] http://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-
what-are-differences.
it a powerful feature [5]. The digital signature can be defined [5] V. K. Mitali and A. Sharma, “A survey on various cryptography
as an online signature that will provide two main points, first techniques,” International Journal of Emerging Trends Technology in
is that the message was sent to the required person with no Computer Science, vol. 3.
[6] S. K. G. Omar G. Abood, “A survey on cryptography algorithms,”
changes, second, is that the identity of the sender is guaranteed International Journal of Scientific and Research Publications, vol. 8,
[15]. On the other hand, the main disadvantage of the RSA 2018.
algorithm is its slow processing [5]. ECC is based upon the [7] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining
digital signatures and public-key cryptosystems,” Commun. ACM,
algebraic structure [16] of elliptic curves over a finite field. The vol. 21, no. 2, pp. 120–126, Feb. 1978. [Online]. Available:
main advantage of ECC over other public key algorithms like http://doi.acm.org/10.1145/359340.359342
RSA, key exchange. It requires shorter key lengths to make [8] H. Adki, V. M., “A survey on cryptography techniques,” International
Journal of Advanced Research in Computer Science and Software
sure the same level of security. For example, 160 bit key in Engineering, vol. 6, 2016.
ECC is considered to be as secure as 1024 bit key in RSA. [9] S. A. Ritu Tripathi, “Comparative study of symmetric and asymmetric
Other than this ECC in particularly appropriate for wireless cryptography techniques,” International Journal of Advance Foundation
and Research in Computer, vol. 1, 2014.
communication. Elliptic Curve Cryptography has become the [10] R. S. Jamgekar and G. S. Joshi, “File encryption and decryption using
cryptographic choice for networks and communication devices secure rsa,” International Journal of Emerging Science and Engineering
due to its size and efficiency benefits. Elliptic curve cipher uses (IJESE, pp. 11–14, 2013.
[11] X. Li, X. Shen, and H. Chen, “Elgamal digital signature algorithm of
very small keys and is computationally very efficient, which adding a random number,” JNW, vol. 6, pp. 774–782, 2011.
makes it ideal for the smaller, less powerful devices being used [12] AnnapoornaShetty, S. Shetty, and K. Krithika, “A review on asymmetric
today by most individuals to access network services. Elliptic cryptography ?rsa and elgamal algorithm,” 2014.
[13] http://www.certicom.com.
curve cryptography is more complicated than RSA. As in RSA [14] R. Ansah, E.-P. Samuel, D. Attuabea, B. Adjei, B.-R. K Bawuah,
single encryption algorithms is used. ECC can be implemented and P. Antwi, “Relevace of elliptic curve cryptography in modern-day
in different ways. ECC uses arithmetic algorithms as the main technologie,” vol. 3 (2), pp. 1–10, 01 2018.
[15] A. U. Hardik Gohel, “Study of cyber security with advance concept
objective operations for high-level security functions such as of digital signature,” International Journal of Advanced Research in
encryption for gaining confidentiality and a digital signature Computer Science, vol. 6, 2015.
for authentication. ECC can be implemented in software and [16] R. Ansah, R. Boadi, W. Obeng-Denteh, and A. Y Omari-Sasu, “Review
of the birch and swinnerton-dyer conjecture,” vol. 2016, pp. 182–189,
in hardware. ECC follows generic procedure like parties agree 08 2016.
on publicly-known data items and each user generates their [17] D. M. Behrouz A Forouzan, Cryptography and Network Security.
public and private keys [9] [17] [15] [13] [18] [19]. McGraw-Hill Education, 2011.
[18] G. Shen and B. Liu, “Research on efficiency of computing kp in
Overall ECC is more efficient and secure than RSA as shown elliptic curve system,” in 2010 6th International Conference on Wireless
in Table 2. Communications Networking and Mobile Computing (WiCOM), Sep.
2010, pp. 1–4.
TABLE II [19] V. G. N. G. Sheueling Chang, Hans Eberle, “Sunmicrosystems labora-
C OMPARISON BETWEEN RSA AND ECC tories howeccworks-usletter.pdf.”
VII. C ONCLUSION
This paper presents a survey of the main important crypto-
graphic algorithms such us ECC, El-Gamal and RSA.
These algorithms are studied in order to be compared.
Comparisons prove that the cost of transmission is enormously
176
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 28,2023 at 06:26:47 UTC from IEEE Xplore. Restrictions apply.