RSA and ElGamal encryption time comparison

RSA and ElGamal encryption time comparison

Source publication
Article
Full-text available
Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These al...

Context in source publication

Context 1
... and RSA have relatively similar time in generating key. Comparison of encryption time and decryption time are as shown in Figure 4 and Figure 5. RSA algorithm and ElGamal algorithm are asymmetric algorithms and have different formulas for encryption and decryption process where RSA algorithm is faster than ElGamal algorithm. 1) Encryption time (Computation Time/ Response Time) is the time needed for an algorithm to do encryption and produce cipher text. ...

Similar publications

Article
Full-text available
Overflow is one of the most serious drilling accidents that affect the safety of drilling construction. The analysis of integrated logging parameters and the judgement of overflow situation in China still remain in the stage of "manual judgement" and "threshold warning". Based on this, we propose the method of combining the real time measurement in...
Research
Full-text available
This paper presents an improved chat bot system in the in the world of app development and programming, by using Artificial Intelligence techniques. The model proposed in this work analyses a developer's app code or program source code then it would apply some Big Data and Machine Learning techniques to generate a better code of that program. The s...
Article
Full-text available
Over time, industrial equipment, particularly in the oil, gas, and petrochemical industries, is subjected to various forms of degradation and damage that can affect its structural integrity. Most of the Codes and Standards pertaining to components do not address the issues of degradation and damage. As such, performing a Fitness For Service (FFS) a...
Article
Full-text available
An online evaluation method of coal mine comprehensive level based on Fuzzy Comprehensive Evaluation method (FCE) is proposed. Firstly, following the principles of fairness, systematicness and hierarchy, taking research and development, production, sales, finance, safety and management as the first level indicators, a set of multi-level evaluation...

Citations

... Some researchers have conducted study to compare various cryptographic methods to determine its effectiveness during certain tasks. For example, Iswari [11] compared RSA and ElGamal in terms of key generation, while Mawengkang [19] compared ElGamal and LUC algorithm in terms of file security. Sann [20] also performed comparison of ElGamal and RSA algorithm for the encryption and decryption process for mail services. ...
Article
Full-text available
In today’s era of digital, data security in communication channel becomes important factor to be considered during exchange of information. Cryptography is one of techniques to send and receive information securely through an insecure channel. Based on the number of keys used, encryption methods are categorized as symmetric and asymmetric cryptography. Compared to symmetric cryptography that often suffers from key management issues, asymmetric cryptography delivers higher level of data security. Thus, asymmetric cryptography is more preferred when security if the priority. To determine suitable algorithm, three essential aspects should be considered: security, speed, and prime numbers. This study aims to compare the application of asymmetric cryptographic algorithms between ElGamal and LUC algorithms in the key generation process. A comparative analysis of these two algorithms was conducted by evaluating the processing speed and prime numbers during key generation process to determine the advantages and drawbacks from ElGamal and LUC algorithms. The application in this study was developed using PHP programming language by following the Waterfall Model. Application testing involved two kinds of tests: (i) Black Box test and (ii) System Usability Scale (SUS) test. Results show the application developed from this study successfully performed the encryption, decryption, and checking of prime numbers from ElGamal and LUC algorithms. It displayed ciphertext, plaintext, and the speed of the encryption and decryption process from both methods. The black box test showed that all application functions follow the user's needs, while System Usability Scale (SUS) test obtained an average score of SUS interpretation of 83.75. This value means the adjective ratings was “excellent”, the grade scale was “B”, and the acceptability range was “acceptable”. It is concluded that the LUC algorithm superior to ElGamal in terms of the speed of encryption process. However, during the decryption process the LUC algorithm responded slower than ElGamal.
... Penyembunyian data juga bersifat searah yaitu pesan rahasia yang dikodekan oleh pengirim hanya dapat dipecahkan menggunakan kunci privat oleh penerima. Sayangnya, Algoritma RSA lebih cepat melakukan proses enkripsi, sedangkan lambat dalam melakukan proses dekripsi [2]. Untuk kasus penyisipan jalur penerbangan rahasia, diperlukan algoritma dengan waktu dekripsi yang lebih cepat dan keamanan yang relatif tinggi karena isi file penerbangan hanya berisi angka koordinat serta hanya memiliki ukuran file yang kecil. ...
Article
Full-text available
Untuk menyelesaikan misi penerbangan, UAV akan membutuhkan rute perjalanan yang harus ditempuh beserta koordinat lokasi yang spesifik. Akan tetapi, banyak misi yang harus diselesaikan secara rahasia, misalnya tugas kenegaraan, demi menjamin keselamatan terbang UAV dari serangan pihakpihak yang tidak bertanggung jawab. Untuk itu, diperlukan mekanisme kriptografi data rute perjalanan dan steganografi pada suatu media digital agar keamanan pengiriman data lebih terjamin. Metode yang digunakan adalah kriptografi kunci publik ElGamal karena kecepatan dekripsi yang baik dan kalkulasi matematika yang lebih sulit sehingga meningkatkan keamanan data. Metode Steganografi yang digunakan adalah Least Significant Bit (LSB) sehingga kualitas media digital setelah dilakukan penyisipan data tidak jauh berbeda dari aslinya. Didapatkan hasil bahwa seluruh eksperimen mencapai nilai di atas 30 yang menunjukkan kualitas Steganografi kunci publik sangat baik.
Chapter
Cloud is providing virtual environment in order to share the data across multiple owners and users across pervasive computing environments. The security among virtual environment is the key challenge of the research in providing role-based access control policies and providing security to the confidential data of the cloud owners. Cloud generally provides low-cost services and provides the end-to-end solutions through managing the documents and various files of the data owner, and data of the owners is available in various formats. Key management and cryptographic techniques are widely used to provide security to the data transmitted across insecure networks. The secret key management is providing the valid keys to authenticate through the cloud-based services and access with valid keys and providing security without any loopholes in the transmission and sharing the data through owners and cloud users. A symmetric key management algorithm is used to provide a unique to each and every cloud user and a group key to access the permissions and allows particular used to gain access to the cloud services using key pairs for valid authentication process. Providing security across multi-cloud environment through PACM techniques and implementing most advanced secured key management algorithms to overcome the existing data leakages across cloud computing environment.