Comparison of two Public Key Cryptosystems

سال انتشار: 1397
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 39

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JOPN-3-3_005

تاریخ نمایه سازی: 25 بهمن 1402

چکیده مقاله:

Since the time public-key cryptography was introduced by Diffie andHellman in ۱۹۷۶, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpopular of these algorithms, RSA and ElGamal for key generation and the encryptionscheme (encryption/decryption operation). RSA relies on the difficulty of primefactorization of a very large number, and the hardness of ElGamal algorithm isessentially equivalent to the hardness of finding discrete logarithm modulo a largeprime. These two systems are compared to each other from different parameters pointsof view such as performance, security, speed and applications. To have a goodcomparison and also to have a good level of security correspond to users need thesystems implemented are designed flexibly in terms of the key size.

کلیدواژه ها:

نویسندگان

mahnaz mohammadi

Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran

alireza zolghadr

Faculty of Computer and Electrical Eng., Department of Communication and Electronics, Shiraz University, Shiraz, Iran

mohammad pourmina

Department of Electrical and Electronic Eng., Science and Research Branch, Islamic Azad University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • S. William, Cryptography and Network Security Principles and Practice, ۷th ...
  • JS. Coron, T. Holenstein, R. Künzler, et al., How to ...
  • I. Mironov, O. Pandey, O. Reingold, Gil Segev, Incremental Deterministic ...
  • P. K. Panda, S. Chattopadhyay, A hybrid security algorithm for ...
  • S. B. Sadkhan, F. H. Abdulraheem, A proposed ANFIS evaluator ...
  • F. Mo, Y. C. Hsu, H. H. Chang, S. C. ...
  • Y. Jitarwal, P. K. Mangal, S. K. Suman, Enhancement of ...
  • T. H. Cormen, C. E. Lieserson, R. L. Rivest, Introduction ...
  • A. J. Menezes, P.van Oorschot, S. A. Vanstone, Handbook of ...
  • B. Schneier, Applied cryptography: protocols, algorithms, and source code in ...
  • P. Ribenboim, The Book of Prime Number Records, ۲nd ed., ...
  • J. H. Seo, , Short Signatures from Diffie–Hellman: Realizing Almost ...
  • A. Ara, M. Al-Rodhaan, Y. Tian, A. Al-Dhelaan. A Secure ...
  • Y. Murakami, M. Kasahara, Hybrid inter-organization cryptosystem using ElGamal cryptosystem, ...
  • نمایش کامل مراجع