Skip to main content
Top

2023 | OriginalPaper | Chapter

Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity

Authors : Ankita Kumari, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, two algorithms are compared based on their time complexity. The time complexity is defined by encryption and decryption of different message lengths. Time varies for different lengths of messages. We statistically analyzed the time complexity of the algorithm and compared their results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jianmin C, Wu J (2005) A survey on cryptography applied to secure mobile ad-hoc networks and wireless sensor networks. In: Proceedings of CRYPTO, pp 27–56 Jianmin C, Wu J (2005) A survey on cryptography applied to secure mobile ad-hoc networks and wireless sensor networks. In: Proceedings of CRYPTO, pp 27–56
2.
go back to reference Sharma A, Bhuriya D, Singh U (2015) Secure data transmission on MANET by hybrid cryptography technique. In 2015 International conference on computer, communication, and control (IC4), pp 1–6 Sharma A, Bhuriya D, Singh U (2015) Secure data transmission on MANET by hybrid cryptography technique. In 2015 International conference on computer, communication, and control (IC4), pp 1–6
3.
go back to reference Leu S, Chang RS (2012) A weight-value algorithm for finding connected dominating sets in a MANET. J Netw Comput Appl 35(5):1615–1619CrossRef Leu S, Chang RS (2012) A weight-value algorithm for finding connected dominating sets in a MANET. J Netw Comput Appl 35(5):1615–1619CrossRef
4.
go back to reference Sun B, Pi S, Gui C, Zeng Y, Yan B, Wang W, Qin Q (2008) Multiple constraints QoS multicast routing optimization algorithm in MANET based on GA. Prog Nat Sci 18(3):331–336CrossRef Sun B, Pi S, Gui C, Zeng Y, Yan B, Wang W, Qin Q (2008) Multiple constraints QoS multicast routing optimization algorithm in MANET based on GA. Prog Nat Sci 18(3):331–336CrossRef
5.
go back to reference Arora SK, Monga H (2016) Performance evaluation of MANET based on knowledge base algorithm. Optik 127(18):7283–7291CrossRef Arora SK, Monga H (2016) Performance evaluation of MANET based on knowledge base algorithm. Optik 127(18):7283–7291CrossRef
6.
go back to reference Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2015) Delay optimization using the Knapsack algorithm for multimedia traffic over MANETs. Expert Syst Appl 42(20):6819–6827CrossRef Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2015) Delay optimization using the Knapsack algorithm for multimedia traffic over MANETs. Expert Syst Appl 42(20):6819–6827CrossRef
7.
go back to reference Hu CC, Lai CF, Hou JG, Huang YM (2017) Timely scheduling algorithm for P2P streaming over MANETs. Comput Netw 127:56–67CrossRef Hu CC, Lai CF, Hou JG, Huang YM (2017) Timely scheduling algorithm for P2P streaming over MANETs. Comput Netw 127:56–67CrossRef
8.
go back to reference Pranav P, Dutta S, Chakraborty S (2021) Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption Pranav P, Dutta S, Chakraborty S (2021) Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption
9.
go back to reference Sari PP, Nababan EB, Zarlis M (2020) Comparative study of Luc, ElGamal, and RSA algorithms in encoding texts. In: 2020 3rd international conference on mechanical, electronics, computer, and industrial technology (MECnIT). IEEE, pp. 148–151 Sari PP, Nababan EB, Zarlis M (2020) Comparative study of Luc, ElGamal, and RSA algorithms in encoding texts. In: 2020 3rd international conference on mechanical, electronics, computer, and industrial technology (MECnIT). IEEE, pp. 148–151
10.
go back to reference Mallouli F, Hellal A, Saeed NS, Alzahrani FA (2019) A survey on cryptography: a comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. In: 2019 6th IEEE International conference on cyber security and cloud computing (CSCloud)/2019 5th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, pp 173–176 Mallouli F, Hellal A, Saeed NS, Alzahrani FA (2019) A survey on cryptography: a comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. In: 2019 6th IEEE International conference on cyber security and cloud computing (CSCloud)/2019 5th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, pp 173–176
11.
go back to reference Jintcharadze E, Iavich M (2020) Hybrid implementation of Twofish, AES, ElGamal, and RSA cryptosystems. In: 2020 IEEE East-West design & test symposium (EWDTS). IEEE, pp 1–5 Jintcharadze E, Iavich M (2020) Hybrid implementation of Twofish, AES, ElGamal, and RSA cryptosystems. In: 2020 IEEE East-West design & test symposium (EWDTS). IEEE, pp 1–5
12.
go back to reference Iswari NMS (2016) Key generation algorithm design combination of RSA and ElGamal algorithm. In: 2016 8th International conference on information technology and electrical engineering (ICITEE). IEEE, pp 1–5 Iswari NMS (2016) Key generation algorithm design combination of RSA and ElGamal algorithm. In: 2016 8th International conference on information technology and electrical engineering (ICITEE). IEEE, pp 1–5
13.
go back to reference Pandian AP (2020) Development of secure cloud-based storage using the Elgamal hyper elliptic curve cryptography with fuzzy logic-based integer selection. J Soft Comput Paradigm 2(1):24–35CrossRef Pandian AP (2020) Development of secure cloud-based storage using the Elgamal hyper elliptic curve cryptography with fuzzy logic-based integer selection. J Soft Comput Paradigm 2(1):24–35CrossRef
Metadata
Title
Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity
Authors
Ankita Kumari
Prashant Pranav
Sandip Dutta
Soubhik Chakraborty
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_9

Premium Partner