SlideShare a Scribd company logo
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014

Survey on Asymmetric Key Cryptography Algorithms
S. Nithya , Dr. E. George Dharma Prakash Raj
Computer Science and Engineering, Bharathidasan University, Trichy, India.
Computer Science and Engineering ,Bharathidasan University, Trichy, India.
niyaa20@yahoo.co.in,georgeprakashraj@yahoo.com

ABSTRACT
II. PUBLIC KEY CRYPTOGRAPHY
ALGORITHMS

Asymmetric key encryption is also called
public key encryption. It uses two keys known as a
public and a private key. Data encrypted with one key
can be decrypted only with the other key. This paper
discusses some public key algorithms and its
advantages and disadvantages such as Rivest Shamir
Adleman,
Diffi-Hellman,
Elliptic
Curve
Cryptography,
Elliptic
Curve
Diffi-Hellman,
ElGamal
Encryption
Algorithm,
Knapsack
Algorithm, Digital Signature Algorithm and Short
Range Natural Numbers.

A. Rivest Adi Adleman (RSA)
In 1978, Ron Rivest, Adi Shamir, and
Leonard Adleman introduced a cryptographic
algorithm, which was essentially to replace the less
secure National Bureau of Standards (NBS)
algorithm. In RSA, this asymmetry is based on the
practical difficulty of factoring the product of two
large prime numbers, the factoring problem [2].
In such a cryptosystem, the encryption key
is public and differs from the decryption key which
is kept secret. The RSA algorithm involves three
steps: key generation, encryption and decryption.
(i)
Key generation:
R1. Users of RSA must determine two primes
at random: p, q
R2. Select either e or d and compute the other
Primes p, q must not be easily derived from
modulus N=p*q
R3. Exponent e, d is inverses, so use inverse
algorithm to compute the other.

Keywords
Cryptography, Rivest Shamir Adleman, Elliptic Curve
Cryptography, Diffi - Hellman, Digital Signature.

I. INTRODUCTION
All public key cryptosystems are based on
the notion of a one-way function. Which depending
on the public key, converts plaintext into cipher
text using are relatively small amount of computing
power but whose inverse function is extremely
expensive to compute, so that an attacker is not
able to derive the original plaintext from the
transmitted cipher text within a reasonable time
frame. In public key cryptography, each user or the
device taking part in the communication have a pair
of keys, a public key and a private key, and a set of
operations associated with the keys to do the
cryptographic operations. Only the particular
user/device knows the private key whereas the
public key is distributed to all users/devices taking
part in the communication. It increased security and
convenience: private keys never need to be
transmitted or revealed to anyone [1].
This paper work focuses on brief
descriptions of various public key cryptography
algorithms which are discussed on section II and in
section III advantages and disadvantages of these
algorithms were made in the form of comparative
study.

(ii)
Encryption:
R4. To encrypt a message m the sender
R5. Obtains public key of recipient Pu= {e.N}
R6. Computes: C=Me mod N, where 0≤M<N
(iii)
Decryption:
R7.To decrypts the cipher text c the owner
R8.Uses their private key PR= {d, p, q}
R9. Computes: M=Md mod N
B. Diffi-Hellman key exchange (D-H)
The DH algorithm, introduced by Whitfield
Diffie and Martin Hellman in 1976, was the first
system to utilize “public-key” or “asymmetric”
cryptographic keys. These systems overcome the
difficulties of “private-key” or “symmetric” key
systems because asymmetric key management is
much easier [3]. DH is a mathematical algorithm
that allows two computers to generate an identical
shared secret on both systems, even though those
systems may never have communicated with each

1
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
S7.Compute r= (αk mod p) mod q
S8.Compute k-1 mod q
S9.Compute s=k-1 ∗(h (m) + ar) mod q
S10.Signature = (r, s)

other before. That shared secret can then be used to
securely exchange a cryptographic encryption key.
That key then encrypts traffic between the two
systems.
The Diffi-Hellman Key Exchange is one of the
more popular and interesting methods of key
distribution. It is a public-key cryptographic system
whose sole purpose is for distributing keys.

(iii)
Verification:
S11.Verify 0<r<q and 0<s<q, if not, invalid
S12.Compute w= s-1mod q and h (m)
S13.Compute u1=w∗h (m) mod q, u2=r∗w mod
q
S14. Compute v = (αu1yu2 mod p) mod q
S15. Valid if v=r

(i)
Key algorithm:
It is also possible to use Diffi–Hellman as part
of a public key infrastructure.
D1. First, both Alice and Bob agree upon a
prime number and another number that has no
factor in common. Let’s call the prime number
as p and the other number as g. Note that g is
also known as the generator and p is known as
prime modulus.
D2. Now, g a mod p and g b mod p is the public
key for Alice and Bob respectively.
D3. Alice and Bob exchanged their public
keys.
D4. Alice computes (g b mod p) a mod p that is
equal to g ba mod p.
D5. Bob computes (g a mod p) b mod p that is
equal to g ab mod p.
D6. K= g ba mod p=g ab mod p, shared secret
=k.

D. Elliptic curve cryptography (ECC)
Elliptic curve cryptography (ECC) is an
approach to public-key cryptography based on the
algebraic structure of elliptic curves over finite
fields. The use of elliptic curves in cryptography
was suggested independently by Neal Koblit and
Victor S. Millerin 1985. Elliptic curves are also
used in several integer factorization algorithms that
have applications in cryptography [5].

E. Elliptic curve Diffie–Hellman (ECDH)
Elliptic curve Diffie-Hellman is an
anonymous key agreement protocol that allows two
parties, each having an elliptic curve public–private
key pair, to establish a shared secret over an
insecure channel. This shared secret may be
directly used as a key, or better yet, to derive
another key which can then be used to encrypt
subsequent communications using a symmetric key
cipher. It is a variant of the Diffie–Hellman
protocol using elliptic curve cryptography [6].

C. Digital Signature Algorithm (DSA)
The Digital Signature Algorithm (DSA) is
a Federal Information Processing Standard for
digital signatures. It was proposed by the National
Institute of Standards and Technology (NIST) in
August 1991 for use in their Digital Signature
Standard (DSS) and adopted as FIPS 186 in 1993.
A digital signature scheme typically
consists of three algorithms: A key generation
algorithm that selects a private key uniformly at
random from a set of possible private keys. The
algorithm outputs the private key and a
corresponding public key [4]. A signing algorithm
that, given a message and a private key, produces a
signature. A signature verifying algorithm that,
give a message, public key and a signature, either
accepts or rejects the message's claim to
authenticity.

(i) Key generation algorithm:
E1. Alice wants to establish a shared key with
Bob.
E2. The domain parameters must be agreed
upon.
E3. Let Alice's key pair be ( 𝑑 𝐴 ,𝑄 𝐴 ) and Bob's
key pair be (𝑑 𝐵 , 𝑄 𝐵 ).
E4. Alice computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐴 𝑄 𝐵 . Bob
computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐵 𝑄 𝐴 .
E5. The shared secret calculated by both
parties is equal 𝑑 𝐴 𝑄 𝐵 =𝑑 𝐴 𝑑 𝐵 G=𝑑 𝐵 𝑑 𝐴
G=𝑑 𝐵 𝑄 𝐴 .

(i)
Key generation:
S1.select a prime q of 160 bits
S2.Choose 0≤t≤8, select 2511+64t <p< 2512+64t
with q|p-1
S3.Select g in Zp*, and α = g (p-1)/q mod p, α≠1
S4.Select 1 ≤ a ≤q-1, compute y= αa mod p
S5.public key (p, q,α, y), private key a

F. ElGamal Encryption Algorithm

In cryptography, the ElGamal encryption
system is an asymmetric key encryption algorithm
for public-key cryptography which is based on the
Diffie–Hellman key exchange. It was described by
Taher Elgamal in 1984. ElGamal encryption

(ii)
Signing:
S6.Select a random integer k, 0 < k < q

2
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
consists of three components: the key generator, the
encryption algorithm, and the decryption algorithm
[7].

q is larger than the sum of every subset of w, no
sums are congruent mod q and therefore none of
the private key's sums will be equal. r must be co
prime to q or else it will not have an inverse mod q.
The existence of the inverse of r is necessary so
that decryption is possible.

(i) Key generation:
G1. Alice generates an efficient description of
a multiplicative cyclic group G of order q with
generator g. See below for a discussion on the
required properties of this group.
G2. Alice chooses a random x from {1... q-1}.
G3. Alice computes h=𝑔 𝑥 .
G4. Alice publishes h, along with the
description of g, q, g, as her public key. Alice
retains x as her private key which must be kept
secret.

Now calculate the sequence
β = (β1, β2... βn) where βi = rwi mod q.
The public key is β, while the private key is (w, q,
and r).
(ii)
Encryption:
To encrypt an n-bit message
α = (α1, α2... αn),
Where
Is the i-th bit of the message and
calculate

(ii) Encryption:
The encryption algorithm works as follows: to
encrypt a message m to Alice under her public key
(g, q, g, h)
G5. Bob chooses a random y from {1..., q-1},
then calculates 𝑐1 =𝑔 𝑦 .
G6. Bob calculates the shared secret s=ℎ 𝑦 .
G7. Bob converts his secret message m into an
element 𝑚′ of G.
G8. Bob calculates 𝑐2 =𝑚′ .s.
G9. Bob sends the ciphertext (𝑐1 , 𝑐2 =
(𝑔 𝑦 , 𝑚′ . ℎ 𝑦 ) = 𝑔 𝑦 , 𝑚′ . (𝑔 𝑥𝑦 ) to Alice.

{0, 1},

The cryptogram then is c.
(iii)
Decryption:
In order to decrypt a cipher text c a receiver has to
find the message bits αi such that they satisfy

(iii) Decryption:
The decryption algorithm works as follows: to
decrypt a ciphertext (𝑐1 , 𝑐2 ) with her private key x,
G10. Alice calculates the shared secret s= 𝑐1𝑥 .
G11. Then computes 𝑚′ = 𝑐2 . 𝑠 −1 which she
then converts back into the plaintext message
m, where 𝑠 −1 is inverse of in the group G.
The decryption algorithm produces the
intended message.

This would be a hard problem if the βi were random
values because the receiver would have to solve an
instance of the subset sum problem, which is
known to be NP-hard. However, the values βi were
chosen such that decryption is easy if the private
key (w, q, and r) is known [8].
H. Short Range Natural Numbers Algorithm
(SRNN)

G. Knapsack Algorithm
The
Merkle–Hellman
knapsack
cryptosystem was one of the earliest public key
cryptosystems invented by Ralph Merkle and
Martin Hellman in 1978.

In asymmetric key cryptography, also
called Public Key cryptography, two different keys
are used. One key is used for encryption & only the
other corresponding key must be used for
decryption. No other key can decrypt the message not even the original (i.e. the first) key used for
encryption [9]. The beauty of this scheme is that
every communicating party needs just a key pair
for communicating with any number of other
communicating parties. Once someone obtains a
key pair, he /she can communicate with anyone
else. The Short Range Natural Number (SRNN)
algorithm is similar to RSA algorithm with some
modification. This modification increases the
security of the cryptosystem [10].

(i)
Key generation:
To encrypt n-bit messages, choose a super
increasing sequence
w = (w1, w2... wn) of n nonzero natural numbers.
Pick a random integer q, such that
𝑛
q> ∑ 𝑖=1 𝑤𝑖 ,
And a random integer, r, such that gcd (r, q) = 1
(i.e. r and q are co prime).

q Is chosen this way to ensure the uniqueness of the
cipher text. If it is any smaller, more than one
plaintext may encrypt to the same cipher text. Since

(i) Key generation:
N1. Generate two large random prime p, q.

3
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
N2. Compute n=p*q
N3. Compute phi= (p-1) (q-1)
N4. Choose an integer e, 1<e<phi, such that
gcd (e, phi) =1 compute the such that (e*d)
mod phi=1
N5.Pick short range natural number u
randomly such that u<phi-1
N6.Pick another Short range natural number a
randomly such that phi>a>u and compute ua
N7.Find d such that,
e*d mod ((p-1) (q-1)) =1
N8. Public key is (n, e, ua)
N9. Private Key is (d, a, u) P, q, phi should
also be kept secret.

6

7

III. Advantages and Disadvantages
The various asymmetric key cryptography
algorithms’ advantage and disadvantage is
discussed in the following table.

Advantages
Only intended
user can read
the
message
using
their
private key.

2

DiffieHellman

3

DSA

The shared key
(i.e. the secret)
is never itself
transmitted over
the channel
It is used for
authentication
and
Integrity

4

ECC

5

ECDH

Short key is
faster
and
requires
less
computing
power.
Very
secure
means
of

deciphering keys are
easy
sequences, they are
breakable
Increase the timeperformance.

REFERENCES
[1]. Caregia Mellon Software Engineering institute, “Public Key
Cryptography”.
[2]. Yaun Xue, “Public key Cryptography and RSA Algorithm”,
Technical notes and papers.
[3]. Alese, B. K.Philemon E. D., Falaki, S. O., “Comparative
Analysis of Public-Key Encryption Schemes”, International
Journal of Engineering and Technology Volume 2 No. 9,
September, 2012
[4]. Aqeel Khalique, Kuldip Singh Sandeep Sood,
“Implementation of Elliptic Curve Digital Signature Algorithm”,
International Journal of computer Application, May 2010.
[5]. Kamlesh Gupta, Sanjay Silakari, “ECC over RSA for
Asymmetric Encryption: A Review”, IJCSI May 2011.
[6]. Ruchika Markan , Gurvinder Kaur, “ Literature Survey on
Elliptic Curve Encryption Techniques”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 9, September 2013.
[7]. Rashmi Singh, Shiv Kumar, “ElGamal Algorithm in
Cryptography”, International Journal of Scientific &
Engineering Research Volume 3, Issue 12, December-2012.
[8]. Preeti L. Darade, “Knapsack Based ECC with Encryption
and Decryption”, International Journal of Emerging Technology
and Advanced Engineering, April 2012.
[9].Mr. Hemant Kumar, Dr. Ajith Singh, “An Efficient
Implementation of digital signature Algorithm with SRNN
Public Key Cryptography”, IJRREST, June 2012.
[10]. E. George Dharma Prakash Raj, k. Sheela, “Survey on
public key cryptography algorithms”, IJSRCSMS July 2013.

Table 1. Advantage and disadvantage of various
asymmetric key cryptography algorithms
Algorithms
RSA

SRNN

The
need
for
randomness, and its
slower speed and
has long ciphertext.

IV. CONCLUSION
Public-key authentication, on the other
hand, prevents type of repudiation; each user has
sole responsibility for protecting his or her private
key. This property of public-key authentication is
often
called
non-repudiation.
Secret-key
cryptography
lags
behind
asymmetric
cryptography. Combinations of the two can be
implemented for improved security but secret-key
cryptography by itself proves insecure against man
in the middle attacks. Asymmetric cryptography
has been the foundation for secure data exchange
over networks and while it still has its
shortcomings, new ideas still come forth as the
field continues to evolve.

(iii) Decryption:
N13. Use Recipient private key (d, a, u)
N14. Compute M= (ve c) d mod n where v=
phi-a mod n
N15. Extracts the plaintext from the integer
representative M

S.NO
1

Knapsack

8

(ii) Encryption:
N10. Obtains the recipient’s public key (n, e,
ua)
N11. Represent the plaintext message as
positive integer M
N12. Computes the cipher text C= (m ua) e
mod n
Send the cipher text C to recipient.

ElGamal

exchanging
keys between
two parties
The same
plaintext gives a
different
ciphertext (with
near certainty)
each time it is
encrypted
A perfect
protocol for
distribution of
secret keys
The attack can
be avoided by
increasing the
key size.

Disadvantages
Many
secret-key
encryption methods
that is significantly
faster
than
any
currently available
public-key
encryption.
Lack
of
authentication

The security of the
private key depends
entirely on
the security of the
computer.
It is more expensive
and it shortens the
life time of batteries.

Little difficulty in
exchanging keys

4

More Related Content

What's hot

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
chauhankapil
 
Ch9
Ch9Ch9
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
F010243136
F010243136F010243136
F010243136
IOSR Journals
 
Kleptography
KleptographyKleptography
Kleptography
Erfan Mallick
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
Shivam Singh
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
Priyamvada Singh
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
rinnocente
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Pratik Poddar
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 

What's hot (20)

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Ch9
Ch9Ch9
Ch9
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
F010243136
F010243136F010243136
F010243136
 
Kleptography
KleptographyKleptography
Kleptography
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Cryptography
CryptographyCryptography
Cryptography
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
Rsa
RsaRsa
Rsa
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 

Similar to Survey on asymmetric key cryptography algorithms

Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
Shraddha Gupta
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
Tanner Lovelace
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
werip98386
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
prashantdahake
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 

Similar to Survey on asymmetric key cryptography algorithms (20)

Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Ch09
Ch09Ch09
Ch09
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

More from Editor Jacotech

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Editor Jacotech
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
Editor Jacotech
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
Editor Jacotech
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
Editor Jacotech
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
Editor Jacotech
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
Editor Jacotech
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Editor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
Editor Jacotech
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
Editor Jacotech
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
Editor Jacotech
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
Editor Jacotech
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
Editor Jacotech
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
Editor Jacotech
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
Editor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
Editor Jacotech
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
Editor Jacotech
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
Editor Jacotech
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
Editor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
Editor Jacotech
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofEditor Jacotech
 

More from Editor Jacotech (20)

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Survey on asymmetric key cryptography algorithms

  • 1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014 Survey on Asymmetric Key Cryptography Algorithms S. Nithya , Dr. E. George Dharma Prakash Raj Computer Science and Engineering, Bharathidasan University, Trichy, India. Computer Science and Engineering ,Bharathidasan University, Trichy, India. niyaa20@yahoo.co.in,georgeprakashraj@yahoo.com ABSTRACT II. PUBLIC KEY CRYPTOGRAPHY ALGORITHMS Asymmetric key encryption is also called public key encryption. It uses two keys known as a public and a private key. Data encrypted with one key can be decrypted only with the other key. This paper discusses some public key algorithms and its advantages and disadvantages such as Rivest Shamir Adleman, Diffi-Hellman, Elliptic Curve Cryptography, Elliptic Curve Diffi-Hellman, ElGamal Encryption Algorithm, Knapsack Algorithm, Digital Signature Algorithm and Short Range Natural Numbers. A. Rivest Adi Adleman (RSA) In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem [2]. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. The RSA algorithm involves three steps: key generation, encryption and decryption. (i) Key generation: R1. Users of RSA must determine two primes at random: p, q R2. Select either e or d and compute the other Primes p, q must not be easily derived from modulus N=p*q R3. Exponent e, d is inverses, so use inverse algorithm to compute the other. Keywords Cryptography, Rivest Shamir Adleman, Elliptic Curve Cryptography, Diffi - Hellman, Digital Signature. I. INTRODUCTION All public key cryptosystems are based on the notion of a one-way function. Which depending on the public key, converts plaintext into cipher text using are relatively small amount of computing power but whose inverse function is extremely expensive to compute, so that an attacker is not able to derive the original plaintext from the transmitted cipher text within a reasonable time frame. In public key cryptography, each user or the device taking part in the communication have a pair of keys, a public key and a private key, and a set of operations associated with the keys to do the cryptographic operations. Only the particular user/device knows the private key whereas the public key is distributed to all users/devices taking part in the communication. It increased security and convenience: private keys never need to be transmitted or revealed to anyone [1]. This paper work focuses on brief descriptions of various public key cryptography algorithms which are discussed on section II and in section III advantages and disadvantages of these algorithms were made in the form of comparative study. (ii) Encryption: R4. To encrypt a message m the sender R5. Obtains public key of recipient Pu= {e.N} R6. Computes: C=Me mod N, where 0≤M<N (iii) Decryption: R7.To decrypts the cipher text c the owner R8.Uses their private key PR= {d, p, q} R9. Computes: M=Md mod N B. Diffi-Hellman key exchange (D-H) The DH algorithm, introduced by Whitfield Diffie and Martin Hellman in 1976, was the first system to utilize “public-key” or “asymmetric” cryptographic keys. These systems overcome the difficulties of “private-key” or “symmetric” key systems because asymmetric key management is much easier [3]. DH is a mathematical algorithm that allows two computers to generate an identical shared secret on both systems, even though those systems may never have communicated with each 1
  • 2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014 S7.Compute r= (αk mod p) mod q S8.Compute k-1 mod q S9.Compute s=k-1 ∗(h (m) + ar) mod q S10.Signature = (r, s) other before. That shared secret can then be used to securely exchange a cryptographic encryption key. That key then encrypts traffic between the two systems. The Diffi-Hellman Key Exchange is one of the more popular and interesting methods of key distribution. It is a public-key cryptographic system whose sole purpose is for distributing keys. (iii) Verification: S11.Verify 0<r<q and 0<s<q, if not, invalid S12.Compute w= s-1mod q and h (m) S13.Compute u1=w∗h (m) mod q, u2=r∗w mod q S14. Compute v = (αu1yu2 mod p) mod q S15. Valid if v=r (i) Key algorithm: It is also possible to use Diffi–Hellman as part of a public key infrastructure. D1. First, both Alice and Bob agree upon a prime number and another number that has no factor in common. Let’s call the prime number as p and the other number as g. Note that g is also known as the generator and p is known as prime modulus. D2. Now, g a mod p and g b mod p is the public key for Alice and Bob respectively. D3. Alice and Bob exchanged their public keys. D4. Alice computes (g b mod p) a mod p that is equal to g ba mod p. D5. Bob computes (g a mod p) b mod p that is equal to g ab mod p. D6. K= g ba mod p=g ab mod p, shared secret =k. D. Elliptic curve cryptography (ECC) Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblit and Victor S. Millerin 1985. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography [5]. E. Elliptic curve Diffie–Hellman (ECDH) Elliptic curve Diffie-Hellman is an anonymous key agreement protocol that allows two parties, each having an elliptic curve public–private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or better yet, to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie–Hellman protocol using elliptic curve cryptography [6]. C. Digital Signature Algorithm (DSA) The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS) and adopted as FIPS 186 in 1993. A digital signature scheme typically consists of three algorithms: A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key [4]. A signing algorithm that, given a message and a private key, produces a signature. A signature verifying algorithm that, give a message, public key and a signature, either accepts or rejects the message's claim to authenticity. (i) Key generation algorithm: E1. Alice wants to establish a shared key with Bob. E2. The domain parameters must be agreed upon. E3. Let Alice's key pair be ( 𝑑 𝐴 ,𝑄 𝐴 ) and Bob's key pair be (𝑑 𝐵 , 𝑄 𝐵 ). E4. Alice computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐴 𝑄 𝐵 . Bob computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐵 𝑄 𝐴 . E5. The shared secret calculated by both parties is equal 𝑑 𝐴 𝑄 𝐵 =𝑑 𝐴 𝑑 𝐵 G=𝑑 𝐵 𝑑 𝐴 G=𝑑 𝐵 𝑄 𝐴 . (i) Key generation: S1.select a prime q of 160 bits S2.Choose 0≤t≤8, select 2511+64t <p< 2512+64t with q|p-1 S3.Select g in Zp*, and α = g (p-1)/q mod p, α≠1 S4.Select 1 ≤ a ≤q-1, compute y= αa mod p S5.public key (p, q,α, y), private key a F. ElGamal Encryption Algorithm In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1984. ElGamal encryption (ii) Signing: S6.Select a random integer k, 0 < k < q 2
  • 3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014 consists of three components: the key generator, the encryption algorithm, and the decryption algorithm [7]. q is larger than the sum of every subset of w, no sums are congruent mod q and therefore none of the private key's sums will be equal. r must be co prime to q or else it will not have an inverse mod q. The existence of the inverse of r is necessary so that decryption is possible. (i) Key generation: G1. Alice generates an efficient description of a multiplicative cyclic group G of order q with generator g. See below for a discussion on the required properties of this group. G2. Alice chooses a random x from {1... q-1}. G3. Alice computes h=𝑔 𝑥 . G4. Alice publishes h, along with the description of g, q, g, as her public key. Alice retains x as her private key which must be kept secret. Now calculate the sequence β = (β1, β2... βn) where βi = rwi mod q. The public key is β, while the private key is (w, q, and r). (ii) Encryption: To encrypt an n-bit message α = (α1, α2... αn), Where Is the i-th bit of the message and calculate (ii) Encryption: The encryption algorithm works as follows: to encrypt a message m to Alice under her public key (g, q, g, h) G5. Bob chooses a random y from {1..., q-1}, then calculates 𝑐1 =𝑔 𝑦 . G6. Bob calculates the shared secret s=ℎ 𝑦 . G7. Bob converts his secret message m into an element 𝑚′ of G. G8. Bob calculates 𝑐2 =𝑚′ .s. G9. Bob sends the ciphertext (𝑐1 , 𝑐2 = (𝑔 𝑦 , 𝑚′ . ℎ 𝑦 ) = 𝑔 𝑦 , 𝑚′ . (𝑔 𝑥𝑦 ) to Alice. {0, 1}, The cryptogram then is c. (iii) Decryption: In order to decrypt a cipher text c a receiver has to find the message bits αi such that they satisfy (iii) Decryption: The decryption algorithm works as follows: to decrypt a ciphertext (𝑐1 , 𝑐2 ) with her private key x, G10. Alice calculates the shared secret s= 𝑐1𝑥 . G11. Then computes 𝑚′ = 𝑐2 . 𝑠 −1 which she then converts back into the plaintext message m, where 𝑠 −1 is inverse of in the group G. The decryption algorithm produces the intended message. This would be a hard problem if the βi were random values because the receiver would have to solve an instance of the subset sum problem, which is known to be NP-hard. However, the values βi were chosen such that decryption is easy if the private key (w, q, and r) is known [8]. H. Short Range Natural Numbers Algorithm (SRNN) G. Knapsack Algorithm The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems invented by Ralph Merkle and Martin Hellman in 1978. In asymmetric key cryptography, also called Public Key cryptography, two different keys are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message not even the original (i.e. the first) key used for encryption [9]. The beauty of this scheme is that every communicating party needs just a key pair for communicating with any number of other communicating parties. Once someone obtains a key pair, he /she can communicate with anyone else. The Short Range Natural Number (SRNN) algorithm is similar to RSA algorithm with some modification. This modification increases the security of the cryptosystem [10]. (i) Key generation: To encrypt n-bit messages, choose a super increasing sequence w = (w1, w2... wn) of n nonzero natural numbers. Pick a random integer q, such that 𝑛 q> ∑ 𝑖=1 𝑤𝑖 , And a random integer, r, such that gcd (r, q) = 1 (i.e. r and q are co prime). q Is chosen this way to ensure the uniqueness of the cipher text. If it is any smaller, more than one plaintext may encrypt to the same cipher text. Since (i) Key generation: N1. Generate two large random prime p, q. 3
  • 4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014 N2. Compute n=p*q N3. Compute phi= (p-1) (q-1) N4. Choose an integer e, 1<e<phi, such that gcd (e, phi) =1 compute the such that (e*d) mod phi=1 N5.Pick short range natural number u randomly such that u<phi-1 N6.Pick another Short range natural number a randomly such that phi>a>u and compute ua N7.Find d such that, e*d mod ((p-1) (q-1)) =1 N8. Public key is (n, e, ua) N9. Private Key is (d, a, u) P, q, phi should also be kept secret. 6 7 III. Advantages and Disadvantages The various asymmetric key cryptography algorithms’ advantage and disadvantage is discussed in the following table. Advantages Only intended user can read the message using their private key. 2 DiffieHellman 3 DSA The shared key (i.e. the secret) is never itself transmitted over the channel It is used for authentication and Integrity 4 ECC 5 ECDH Short key is faster and requires less computing power. Very secure means of deciphering keys are easy sequences, they are breakable Increase the timeperformance. REFERENCES [1]. Caregia Mellon Software Engineering institute, “Public Key Cryptography”. [2]. Yaun Xue, “Public key Cryptography and RSA Algorithm”, Technical notes and papers. [3]. Alese, B. K.Philemon E. D., Falaki, S. O., “Comparative Analysis of Public-Key Encryption Schemes”, International Journal of Engineering and Technology Volume 2 No. 9, September, 2012 [4]. Aqeel Khalique, Kuldip Singh Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of computer Application, May 2010. [5]. Kamlesh Gupta, Sanjay Silakari, “ECC over RSA for Asymmetric Encryption: A Review”, IJCSI May 2011. [6]. Ruchika Markan , Gurvinder Kaur, “ Literature Survey on Elliptic Curve Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013. [7]. Rashmi Singh, Shiv Kumar, “ElGamal Algorithm in Cryptography”, International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012. [8]. Preeti L. Darade, “Knapsack Based ECC with Encryption and Decryption”, International Journal of Emerging Technology and Advanced Engineering, April 2012. [9].Mr. Hemant Kumar, Dr. Ajith Singh, “An Efficient Implementation of digital signature Algorithm with SRNN Public Key Cryptography”, IJRREST, June 2012. [10]. E. George Dharma Prakash Raj, k. Sheela, “Survey on public key cryptography algorithms”, IJSRCSMS July 2013. Table 1. Advantage and disadvantage of various asymmetric key cryptography algorithms Algorithms RSA SRNN The need for randomness, and its slower speed and has long ciphertext. IV. CONCLUSION Public-key authentication, on the other hand, prevents type of repudiation; each user has sole responsibility for protecting his or her private key. This property of public-key authentication is often called non-repudiation. Secret-key cryptography lags behind asymmetric cryptography. Combinations of the two can be implemented for improved security but secret-key cryptography by itself proves insecure against man in the middle attacks. Asymmetric cryptography has been the foundation for secure data exchange over networks and while it still has its shortcomings, new ideas still come forth as the field continues to evolve. (iii) Decryption: N13. Use Recipient private key (d, a, u) N14. Compute M= (ve c) d mod n where v= phi-a mod n N15. Extracts the plaintext from the integer representative M S.NO 1 Knapsack 8 (ii) Encryption: N10. Obtains the recipient’s public key (n, e, ua) N11. Represent the plaintext message as positive integer M N12. Computes the cipher text C= (m ua) e mod n Send the cipher text C to recipient. ElGamal exchanging keys between two parties The same plaintext gives a different ciphertext (with near certainty) each time it is encrypted A perfect protocol for distribution of secret keys The attack can be avoided by increasing the key size. Disadvantages Many secret-key encryption methods that is significantly faster than any currently available public-key encryption. Lack of authentication The security of the private key depends entirely on the security of the computer. It is more expensive and it shortens the life time of batteries. Little difficulty in exchanging keys 4