Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's perfor...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UTM Press
2024
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/42350/ https://doi.org/10.11113/jurnalteknologi.v86.20723 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ums.eprints.42350 |
---|---|
record_format |
eprints |
spelling |
my.ums.eprints.423502024-12-23T02:58:57Z https://eprints.ums.edu.my/id/eprint/42350/ Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis Arif Mandangan Muhammad Asyraf Asbullah Syed Farid Syed Adnan Mohammad Andri Budiman QA1-43 General QA1-939 Mathematics The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes. UTM Press 2024 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf Arif Mandangan and Muhammad Asyraf Asbullah and Syed Farid Syed Adnan and Mohammad Andri Budiman (2024) Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis. Jurnal Teknologi, 86 (4). pp. 1-10. ISSN 2180-3722 https://doi.org/10.11113/jurnalteknologi.v86.20723 |
institution |
Universiti Malaysia Sabah |
building |
UMS Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sabah |
content_source |
UMS Institutional Repository |
url_provider |
http://eprints.ums.edu.my/ |
language |
English |
topic |
QA1-43 General QA1-939 Mathematics |
spellingShingle |
QA1-43 General QA1-939 Mathematics Arif Mandangan Muhammad Asyraf Asbullah Syed Farid Syed Adnan Mohammad Andri Budiman Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
description |
The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes. |
format |
Article |
author |
Arif Mandangan Muhammad Asyraf Asbullah Syed Farid Syed Adnan Mohammad Andri Budiman |
author_facet |
Arif Mandangan Muhammad Asyraf Asbullah Syed Farid Syed Adnan Mohammad Andri Budiman |
author_sort |
Arif Mandangan |
title |
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
title_short |
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
title_full |
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
title_fullStr |
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
title_full_unstemmed |
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis |
title_sort |
comparative of rivest-shamir-adleman cryptosystem and its four variants using running time and memory consumption analysis |
publisher |
UTM Press |
publishDate |
2024 |
url |
https://eprints.ums.edu.my/id/eprint/42350/1/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/42350/ https://doi.org/10.11113/jurnalteknologi.v86.20723 |
_version_ |
1819911288847859712 |
score |
13.223943 |