Javascript must be enabled to continue!
Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms
View through CrossRef
An asymmetric algorithm is an encryption technique that uses different keys on the process of encryption and decryption. This algorithm uses two keys, public key, and private key. The public key is publicly distributed while the private key is kept confidentially by the user and this key is required at the time of the decryption process. RSA and ElGamal are two algorithms that implement a public key cryptosystem. The strength of this algorithm lies in the bit length used. The degree of difficulty in RSA lies in the factorization of large primes while in ElGamal lies in the calculation of discrete logarithms. After testing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. RSA is a deterministic algorithm while ElGamal is a probabilistic algorithm.
Title: Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms
Description:
An asymmetric algorithm is an encryption technique that uses different keys on the process of encryption and decryption.
This algorithm uses two keys, public key, and private key.
The public key is publicly distributed while the private key is kept confidentially by the user and this key is required at the time of the decryption process.
RSA and ElGamal are two algorithms that implement a public key cryptosystem.
The strength of this algorithm lies in the bit length used.
The degree of difficulty in RSA lies in the factorization of large primes while in ElGamal lies in the calculation of discrete logarithms.
After testing, it is proven that RSA performs a faster encryption process than ElGamal.
However, ElGamal decryption process is faster than RSA.
Both of these algorithms are cryptographic public-key algorithms but have functions in different ways.
RSA is a deterministic algorithm while ElGamal is a probabilistic algorithm.
Related Results
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other El...
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci
Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci
Algoritma ElGamal merupakan algoritma dalam kriptografi yang termasuk dalam kategori algoritma asimetris. Keamanan algoritma ElGamal terletak pada kesulitan penghitungan logaritma ...
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Hidden Real Modulus RSA Cryptosystem
Hidden Real Modulus RSA Cryptosystem
Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and consid...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) is typically used for speed-endurance and agility-endurance training and assessment. RSA is preferred as it mimics actual performance during competiti...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

