Analisis Performa dari Algoritma Kriptografi RSA dan ElGamal dalam Enkripsi dan Dekripsi Pesan

Ahmad Miftah Fajrin(1*), Jeremy Richard Benedict(2), Henri Jayanata Kusuma(3),

(1) Universitas Surabaya, Indonesia
(2) Universitas Surabaya, Indonesia
(3) Universitas Surabaya, Indonesia
(*) Corresponding Author

Abstract


Cryptography is one of the most important things in computer science because it is related to data security or message security. Cryptographic algorithms are used to secure a message, the most popular of which are the Rivest-Shamir-Adleman (RSA) and ElGamal algorithms. ElGamal employs a prime number modulo while RSA employs the factorial of two large integer numbers. The workings of these two algorithms are distinct, and each has distinct advantages. Even though the two algorithms use different processes, they can both encrypt and decrypt a message. There are speed factors of execution time and peak memory when running the encryption and decryption process. One of these two factors is hardware, which determines the environment that will be used. According to the findings of this study, the RSA algorithm has a faster execution time than ElGamal. In terms of peak memory, both algorithms get the result similarly, with the same peak memory results shown..

Full Text:

PDF

References


R. Verma and J. Dhiman, “Implementation of Improved Cryptography Algorithm,” International Journal of Information Technology and Computer Science, vol. 14, no. 2, pp. 45–53, Apr. 2022, doi: 10.5815/ijitcs.2022.02.04.

F. Mallouli, A. Hellal, N. Sharief Saeed, and F. Abdulraheem Alzahrani, “A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms,” in Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Jun. 2019, pp. 173–176. doi: 10.1109/CSCloud/EdgeCom.2019.00022.

Y. Ma, C. Li, and B. Ou, “Cryptanalysis of an image block encryption algorithm based on chaotic maps,” Journal of Information Security and Applications, vol. 54, Oct. 2020, doi: 10.1016/j.jisa.2020.102566.

R. Adi Putra and E. R. Prasetyo, “Android-Based Text Message Encryption and Decryption Application Using the Advanced Encryption Standard Algorithm,” Jurnal Media Computer Science, vol. 2, no. 1, pp. 57–62, 2023.

D. Rachmawati and M. A. Budiman, “On Using the First Variant of Dependent RSA Encryption Scheme to Secure Text: A Tutorial,” in Journal of Physics: Conference Series, Jun. 2020, vol. 1542, no. 1. doi: 10.1088/1742-6596/1542/1/012024.

A. Hamza and B. Kumar, “A Review Paper on DES, AES, RSA Encryption Standards,” in Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, Dec. 2020, pp. 333–338. doi: 10.1109/SMART50582.2020.9336800.

D. Sow, L. Robert, and P. Lafourcade, “Linear Generalized ElGamal Encryption Scheme,” Cryptology ePrint Archive, 2020.

A. K. Koundinya and G. SK, “Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation,” International Journal of Wireless and Microwave Technologies, vol. 11, no. 3, pp. 9–15, Jun. 2021, doi: 10.5815/ijwmt.2021.03.02.

O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption,” in Procedia Computer Science, 2020, vol. 167, pp. 1028–1037. doi: 10.1016/j.procs.2020.03.402.

W. Susilo, J. Tonien, and G. Yang, “Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA,” Comput Stand Interfaces, vol. 74, Feb. 2021, doi: 10.1016/j.csi.2020.103470.

S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Robust Image Encryption with Scanning Technology, the El-Gamal Algorithm and Chaos Theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020, doi: 10.1109/ACCESS.2020.3019216.




DOI: http://dx.doi.org/10.30645/jurasik.v8i1.545

DOI (PDF): http://dx.doi.org/10.30645/jurasik.v8i1.545.g523

Refbacks

  • There are currently no refbacks.



JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan : View My Stats