Академический Документы
Профессиональный Документы
Культура Документы
RESEARCH PAPER
OPEN ACCESS
[2]
ABSTRACT
Cryptography is the study of techniques which is used to commun icate, store in forma tion o r data securely, without being
intercepted by third parties. In the real world, there are so many organizations working on large databases over a public
network. The security of data is the primary concern in the public network. Encryption is the mos t commonly used technique
where transactions continuously take p lace between the users. Other cryptography techniques like dig ital time -stamping, dig ital
signature, digital certificates etc., are also used for security purpose. In this paper, we have co mpa red four Public -Key
cryptosystem i.e. RSA, Diffie -Hellman Key Exchange, Elgamal Cryptographic System, and Elliptical Curve Cryptography.
This paper performs security analysis of the above public key cryptosystem and concluded that ECC is the most efficient
public-key cryptosystem. It provides high security solutions that do not impact performance even on constrained devices where
storage, computing power and bandwidth are limited such as PDAs and cell phones.
Keywords:- Cryptography, Encryption, Decryption, Asymmetric Encryption , Symmetric Encryption.
I.
INTRODUCTION
ISSN: 2347-8578
www.ijcstjournal.org
Page 63
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
Plaintext
Encryption
Ciphertext
Ciphertext
Decryption
Plaintext
ISSN: 2347-8578
C = M e mod n
For Decryption
www.ijcstjournal.org
Page 64
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
= (XB) XA mod q
= XB XA mod q
= ( XA ) XB mod q
= ( XA mod q) XB mod q
= (YA ) XB mod q
The result is that the two sides have exchanged a secret value.
As XA and XB are private, an adversary only has the following
ingredients to work with: q, , YA , and YB. Thus, the adversary
is forced to take a discrete logarithm to determine the key.
C. Elgamal Cryptographic System
In 1984, T. Elgamal announced a public key scheme based on
discrete logarith ms. The Elgamal cryptosystem is used in
Dig ital Signature Standard (DSS). The global elements of
Elgamal are a prime nu mber q and , which is a primitive root
of q. User A generates a private/public key pair as
follows[14]:
1. Generate a random integer XA, such that 1< XA < q 1
2. Compute YA = XA mod q
3. As private key is XA : As public key is {q, , YA }
Any user B that has access to As public key can encrypt a
message as follows:
1. Represent the message as an integer M in
the range 0 <= M <= q -1.
2. Choose a random integer k such that 1
<= k <= q 1.
3. Co mpute a one-time key K = (YA )K mod
q.
4. Encrypt M as the pair of integers (C1 , C2 )
where
C1 = k mod q ; C2 = KM mod q
User A recovers the plaintext as follows:
1. Recover the key by computing K = (C1 )
X mod q
A
2. Compute M = (C2 K-1 ) mod q
D. Elliptic Curve Cryptography (ECC)
The idea of using Elliptic curves in cryptography was
introduced by Victor Miller and N. Koblit z as an alternative to
established public-key systems such as DSA and RSA. An
elliptic curve E(F p) over a fin ite field F p is defined by the
parameters a, b Fp (a, b satisfy the relation 4a 3 + 27b 2 0),
consists of the set of points (x, y) Fp, satisfying the equation
y 2 = x3 + a x + b. The set of points on E(F p) also include
point O, wh ich is the point at infinity and wh ich is the identity
element under addition . Elliptic Curve Encryption/Decryption
algorithm can be described as[14][19][17]:
1. Consider a message Pm sent fro m A to B. A
chooses a random positive integer k , a private key
n A and generates the public key PA = n A G and
ISSN: 2347-8578
III.
LITERATURE REVIEW
www.ijcstjournal.org
Page 65
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
provide better performance in this regard. Moreover, Public
key is used for message encryption in the case of socket layer
security. It is clearly ev ident fro m the above that the
alphabetical table described here can be used as a reference to
build elliptic curve cryptography software for provid ing
socket layer security.
Ku mar et al. [5] gave an introduction to the public key
cryptography and its use in applications such as Key
Agreement, Data Encryption and Digital Signature. The main
emphasize is on some public key algorith ms such as RSA and
ECC along with the idea how ECC is better and more secure
method of encryption in comparison to RSA and other
asymmetric cryptosystems. It was concluded that ECC is a
stronger option than the RSA and d iscrete logarith m systems
in the future. Thus, it can be said that ECC is an excellent
choice for doing asymmetric cryptography in portable,
necessarily constrained devices right now. As an exa mple: a
popular, reco mmended RSA key size for most applications is
2,048 bits. For equivalent security using ECC, a key o f only
224 bits is needed. In short, to make a device with a smaller
band, make them run longer on the same battery, and produce
less heat, the most elegant and most efficient asymmetric
cryptosystem that scales for the future is ECC.
Pallipamu et al. [10] performed a security analysis of Dig ital
Signature schemes; RSA, DSA and ElGamal. In this paper the
concept of Cryptography including the various digital
signature schemes of a system based on the kind of key and a
few algorith ms such as RSA, DSA and ECDSA. The
mathematical foundations of various algorith ms for generation
of keys and verification of digital signatures and also their
security strengths were analyzed.
Yadav et al. [16] discussed the concept and implementation of
RSA algorithm for security purpose and to enhance the
performance of software system using this algorithm. Th is
study includes what is RSA algorith m and why they are used
in the field of Cryptography & Network Security. It was
concluded that RSA algorithm is impo rtant to Network
Security because they are the co mponents (i.e. Encryption &
Decryption key) which interact with the Security system.
Without them the system will be useless as RSA are used to
fire a part icular Encryption & Decryption keys process
because of wh ich Security system is build. The attacks made
against the underlying structure of the RSA algorith m, which
exploit weaknesses in the choice of values for the encryption
and decryption keys, and their relation to the RSA modulus N
were described.
Shanmugalakshmi et al. [13] made a co mparison between
ECC and other cryptography algorith ms and explained their
role in the network security. ECCs uses with sma ller keys to
provide high security, high speed in a lo w bandwidth. In this
ISSN: 2347-8578
www.ijcstjournal.org
Page 66
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
as RSA, the number of slightly different versions of ECIES
included in the standards may obstruct the adoption of ECIES.
Chandel et al. [2] in his research paper concentrates on the
different kinds of encryption techniques that are existing. It is
a literature survey of some modern cryptography techniques.
The advantages and disadvantages of the methods are also
discussed in brief. It also aims image encryption techniques,
double encryption, information encryption techniques and
Chaos-based encryption techniques. In this paper, the existing
encryption techniques are studied and analyzed. All the
techniques are useful for real-t ime encryption. There
advantages and disadvantages are discussed. It is found that a
faster version of RSA may be proposed. Also, there is a need
to remove wieners and some other similar attacks.
Lamba et al. [8] studied and analyzed various enhancement
schemes in the basic Diffie- Hellman algorith m. In order to
provide more security to Diffie -Hellman algorith m, different
approaches have been followed till date. One is the
mechanis m of group keys in which only the group members
know the secret key. Another approach is the one in wh ich the
key size has been increased. The comparison between the two
DH algorithms was done according to the key size generated,
which shows that the generated key size fro m the modified
method is greater than the classical one. Attacking the
methods shows that the time needed to compute the private
key for the modified algorith m is greater than the classical one.
Therefore, the modified method is more secure as more t ime
is needed to crack the key. The more recent approach used is
the inclusion of a mathematical function to make the key
harder and the time required to crack the key here is even
more than previous approaches, therefore, is more secure.
IV.
NEED OF STUDY
ISSN: 2347-8578
V.
VI.
ANALYSIS
Examples
Hash Functions
MD4-5, SHA-0-1-2,
RIPDEM
DES, AES, 3DES, RC4
Symmetric Key
Cryptography
Public Key Cryptography
www.ijcstjournal.org
Page 67
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
SKC and PKC algorithms rely on the use of a key or a pair of
keys. A key is a n-b it string that is used to transform data. The
size in b its of the key is an important security parameter in the
cryptographic algorith ms. Table 2 shows the key sizes for
dierent SKC and PKC cryptographic algorithms with
equivalent security level.
Table 2: Key Sizes for Cryptographic Algorithms [21]
Private
ke y size
(bits)
80
160
1024 1012
Until 2010
112
224
2048 1024
Until 2030
128
256
3072 1028
Beyond 2031
which RSA and other public key methods base their security
means that the problems can be considered hard to solve but
not as hard as problems that only allow fu lly exponential
solutions, as ellipt ic curve cryptography. Because of this, ECC
can oer a similar security level than other public key
cryptosystems but using shorter length keys, which implies
less space for key storage, time saving when keys are
transmitted and less costly modular co mputations. These
characteristics make ECC the best choice for securing devices
with constrained resources, like the mobile ones.
Table 4: Complexity of Mathematical Problems in Public
Key Cryptography
Mathematical Problem
192
256
384
512
7680
1047
--
15360
1066
--
In PKC, private and public keys have a mathemat ical relat ion
f, but the private key cannot be obtained from the public one.
In order to recover the p rivate key to decrypt data or to sign
documents, a mathematical problem P related to f must be
solved. The security of public key cryptosystems depends on
the diculty to solve P. In practice, three problems have been
considered to be dicult to solve and are used for
cryptographic applications. Table 3 lists these problems and
the cryptosystems that rely their security on such problems.
Table 3: Public Key Cryptosystems and their Underlying
Mathematical Problems
Cryptosyste ms
Mathematical
Problem
Description
RSA, RabinWilliams
Integer
factorization
ElGammal,
DSA, HellmanDie
Discrete
logarithm
Given a number
n, nd its prime
factors
Given a prime
n, and numbers
g and h, nd x
such that h = g x
mod n
Given an
elliptic curve E
and points P
and Q on E,
nd x such that
Q = x.P
ECDSA, ECDie-Hellman
Elliptic curve
discrete
logarithm
ISSN: 2347-8578
Running time s
ECC Key
Size(bits)
163
1024
1:6
NA
256
3072
1:12
128
384
7680
1:20
192
512
15360
1:30
256
Some public -key algorith ms are suitable for all the three
applications (i.e. Encryption/Decryption, Digital Signature,
Key Exchange) whereas others can be used only for one or
two of these applications. Table 6 describes the applications
supported by the algorithms discussed in this paper.
Table 6: Applications for Public-Key Cryptosystem
www.ijcstjournal.org
Page 68
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
Algorithm
RSA
Elliptic
Curve
Diffie Hellman
DSS
Encryption/Decryption
Yes
Yes
No
No
Digital Signature
Yes
Yes
No
Yes
Key Exchange
Yes
Yes
Yes
No
Fro m Tab le 6 it can be analyzed that RSA and Elliptic Curve
algorith m are suitable for all the three applications. It was also
analyzed that the Elliptic Curve Cryptography takes more
computation but reduced key size in the term of
encryption/decryption of messages.
VII.
CONCLUSIONS
ISSN: 2347-8578
REFERENCES
[1]. Alese, B. K., Ph ilemon E. D., Falaki, S. O.,
Co mparative Analysis of Public-Key Encryption
Schemes, International Journal of
Engineering
and Technology, Volume 2, No. 9, September 2012.
[2]. Chandel Gagendra Singh, Singh Prabhat Ku mar , A
Literature Review of Various Variants of RSA
Cryptosystem, International
Journal of
Advanced Research in
Co mputer Science and
Software Engineering, Volu me 4, Issue 2, February
2014.
[3]. Forouzan Behrouz A., Data Co mmunicat ions &
Networking, Fourth Ed ition, 2008, New Yo rk: Tata
McGraw- Hill.
[4]. Giripunje
Lo kesh,
Nimbhorkar
Sonali,
Co mprehensive Security System for Mobile
Network Using Elliptic Curve Cryptography over
GF (p ), International Journal of Advanced Research
in
Co mputer Science and Soft ware Eng ineering,
Volume 3, Issue 5, May 2013.
[5]. Ku mar Arun,
Tyagi Dr. S.S., Rana Manisha,
Aggarwal Neha, Bhadana Pawan, A Co mparative
Study of Public Key Cryptosystem based on ECC
and RSA,
International Journal on Co mputer
Science and Engineering (IJCSE), Vo lu me 3, No. 5,
May 2011.
[6]. Ku mar D.Sravana , Suneetha CH., Chandrasekhar A.,
Encryption Of Data Using Elliptic Curve Over
Fin ite Fields, International Journal of Distributed
and Parallel Systems (IJDPS), Vo lu me 3, No.1,
January 2012.
[7]. Kute vivek B., Paradhi P.R., Bamnote G.R., A
Software Co mparison of RSA and ECC ,
www.ijcstjournal.org
Page 69
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].
[16].
WEB REFERENCES
[1]. http://www.cert ico m.co m/index.php?action=ecc,
Accessed on 12/09/2015 at 11:00 A.M.
[2]. http://en.wikipedia.org/wiki/ RSA, Aaccessed on
18/12/2014 at 08:00 P.M.
[3]. http://en.wikipedia.org/wiki/ Elliptic_curve_cryptogra
phy, Accessed on 15/06/2015 at 9:00 P.M.
[4]. http://eprint.iacr.org/2008/390.pdf, Accessed on
25/08/2015 at 7:30 A.M.
[5]. http://www.nist.gov/information-technologyportal.cfm, Accessed on 28/03/2015 at 4:30 A.M.
ISSN: 2347-8578
www.ijcstjournal.org
Page 70