Comparative Study Between Asymmetric Algorithms, Rivest Shamir Adleman, Elliptic Curve Cryptography and El-Gamal Algorithms
Comparative Study Between Asymmetric Algorithms, Rivest Shamir Adleman, Elliptic Curve Cryptography and El-Gamal Algorithms
Abstract— Web and information security should be guaranteed for all clients. Consequently, security is an eminent issue when
introducing data to networks. Information is not adequately protected in the way that it ought to be in the modern, globalized world.
One of the most useful aspects of security is cryptography. While imparting colossal amounts of data, cryptography ensures a free
and dependable transaction between the source and the recipient. In addition, the records that were sent and encoded by the source
can only be decoded by the legitimate recipient. To be able to provide these organizations with security, cryptography plays an
essential role. With stacks of data of varying lengths, we examine encryption in this paper despite the decoding time of other
calculations. Without skipping a beat, this work presents the major standards of cryptography: encryption and unscrambling
undertakings. Likewise, it investigates the three most notable computations: El-Gamal, Rivest, Shamir, Adleman. (RSA), and the
Elliptic Curve Our relationship relies totally upon the key size time frame that influences the successively period. We will
occasionally conclude our investigation targeting specifically on the restrictive effects of the Rivest, Shamir, Adleman. (RSA) and
elliptic curve cryptography based on calculations.
Keyword— Encryption, decryption, key, cryptography, RSA, Elliptic Curve.
I. INTRODUCTION
Cryptography is an approach to keeping and exchanging data that uses a specific format that only the
intended recipients can read and process. The digital encryption of the information prevents perpetrators
from reviewing confidential messages. As internet access and other media-related gadgets become
increasingly prevalent, digital safety gains in significance. Cryptography is a security tool utilized for
obtaining messages in emails, information about credit cards (Hohenberger and Waters, 2018), business
data, and any other important information passed through an array of channels and areas such as
networked firms and remote organizations (Das & Goldsztein, 2023). Cryptography can be classified
into two primary groups: symmetrical key contexts and asymmetrical key systems, but various
characteristics can also distinguish it. The primary goals of cryptography are secrecy, accessibility,
access control, honesty, non-renunciation, and verification(Adeniyi, Falola, Maashi, Aljebreen, &
Bharany, 2022). El-Gamal, Rivest, Shamir, Adleman. (RSA), and ECC are probably the most well-
known encryption and unscrambling techniques. The execution times and key sizes of these procedures
are all unique. We propose introducing three significant cryptographic calculations in this paper. It is
important to note that this paper is organized as follows after we present the main cryptographic
concepts: The El-Gamal calculation and RSA are presented and examined in the following section. In
the third section, we compare and contrast the elliptic Curve cryptography and Rivest, Shamir, Adleman.
(RSA)s. Finally, we discuss the results and wrap up.
Cryptography is a technique for effectively distorting data so that legitimate competitors can approach
it. Accepting this cycle requires both art and science. There are two types of this cryptography:
symmetric and topsy-turvy cryptosystems, as shown in Figure 1. The grouping is determined by the key
used in encryption and unscrambling software. A few concepts and expressions used in the cryptographic
environment are depicted in this section. Age range: This is the stage at which plain texts are changed
over totally to encoded texts given the turn of events and control of number-crunching that provoked the
creation of encryption (Hammawa, Bisallah, & Abdulrahman, 2023)Unscrambling is the opposite,
converting scrambled instant messages into ones that can be read. The recipient is able to read and
comprehend the text when it is written in human language or is understandable. Figures 1 and 2 show
how encryptions are done in a cryptosystem using single and twofold keys.
1
.
3
9 Hardware and Effective Effective
Software
Implementation
Elliptic Curve Cryptography (ECC) algorithm do generate keys and also exhibits encoding, and
decoding keys.
5
Fig. 3. Three adding cases in an elliptic curve
TABLE 3
Rivest, Shamir, Adleman. (RSA) And ECC Comparison
RSA ECC
1,024 128
3,072 384
15,360 512
19,456 1,152
19,456 3,456
VII. CONCLUSION
This exploration is a study of the primary significant cryptographic calculations like ECC, El-Gamal,
and RSA. These calculations should be concentrated on to be looked at. Examinations demonstrate that
the expense of transmission is gigantically decreased in ECC. The result exhibits the convenience of
ECC execution. We researched the security of these calculations since they are generally utilized.
REFERENCES
Adeniyi, E. A., Falola, P. B., Maashi, M. S., Aljebreen, M., & Bharany, S. (2022). Secure sensitive data sharing using RSA and ElGamal
cryptographic algorithms with hash functions. Information, 13(10), 442.
Al Mamun, S., Mahmood, M. A., & Amin, M. A. (2021). Ensuring Security of Encrypted Information by Hybrid AES and RSA Algorithm
with Third-Party Confirmation. Paper presented at the 2021 5th International Conference on Intelligent Computing and Control
Systems (ICICCS).
Chinnasamy, P., & Deepalakshmi, P. (2018). Improved Key Generation Scheme of RSA (IKGSR) Algorithm Based on Offline Storage
for Cloud Advances in Big Data and Cloud Computing (pp. 341-350): Springer.
Das, R., & Goldsztein, G. (2023). Mathematics Behind the RSA Algorithm. Journal of Student Research, 12(1).
Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and Hybrid Encryption Techniques: A Survey Networking
Communication and Data Knowledge Engineering (pp. 239-248): Springer.
Hammawa, M., Bisallah, H., & Abdulrahman, A. (2023). Enriching Information Security via Hybrid of New Expand Rivest Shamir
Adleman and Data Encryption Standard Cryptosystem. Journal of Applied Sciences and Environmental Management, 27(1),
155-160.
Islam, M. A., Islam, M. A., Islam, N., & Shabnam, B. (2018). A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime
Numbers. Journal of Computer and Communications, 6(03), 78.
Mathur, S., Gupta, D., Goar, V., & Choudhary, S. (2018). Implementation of Modified RSA Approach for Encrypting and Decrypting Text
Using Multi-power and K-Nearest Neighbor Algorithm Networking Communication and Data Knowledge Engineering (pp. 229-
237): Springer.
Merkepci, M., Abobala, M., & Allouf, A. (2023). The Applications of Fusion Neutrosophic Number Theory in Public Key Cryptography
and the Improvement of RSA Algorithm. Fusion: Practice and Applications.
Roy, D., & Das, P. (2018). A Modified RSA Cryptography Algorithm for Security Enhancement in Vehicular Ad Hoc Networks. Paper
presented at the Proceedings of the International Conference on Computing and Communication Systems.