Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis

The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's perfor...

Full description

Saved in:
Bibliographic Details
Main Authors: Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman
Format: Article
Language:English
Published: UTM Press 2024
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf
https://eprints.ums.edu.my/id/eprint/42350/
https://doi.org/10.11113/jurnalteknologi.v86.20723
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ums.eprints.42350
record_format eprints
spelling my.ums.eprints.423502024-12-23T02:58:57Z https://eprints.ums.edu.my/id/eprint/42350/ Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis Arif Mandangan Muhammad Asyraf Asbullah Syed Farid Syed Adnan Mohammad Andri Budiman QA1-43 General QA1-939 Mathematics The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes. UTM Press 2024 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf Arif Mandangan and Muhammad Asyraf Asbullah and Syed Farid Syed Adnan and Mohammad Andri Budiman (2024) Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis. Jurnal Teknologi, 86 (4). pp. 1-10. ISSN 2180-3722 https://doi.org/10.11113/jurnalteknologi.v86.20723
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
topic QA1-43 General
QA1-939 Mathematics
spellingShingle QA1-43 General
QA1-939 Mathematics
Arif Mandangan
Muhammad Asyraf Asbullah
Syed Farid Syed Adnan
Mohammad Andri Budiman
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
description The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes.
format Article
author Arif Mandangan
Muhammad Asyraf Asbullah
Syed Farid Syed Adnan
Mohammad Andri Budiman
author_facet Arif Mandangan
Muhammad Asyraf Asbullah
Syed Farid Syed Adnan
Mohammad Andri Budiman
author_sort Arif Mandangan
title Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
title_short Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
title_full Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
title_fullStr Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
title_full_unstemmed Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
title_sort comparative of rivest-shamir-adleman cryptosystem and its four variants using running time and memory consumption analysis
publisher UTM Press
publishDate 2024
url https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf
https://eprints.ums.edu.my/id/eprint/42350/
https://doi.org/10.11113/jurnalteknologi.v86.20723
_version_ 1819911288847859712
score 13.223943