Research Article
Open access
Published on 30 November 2023
Download pdf
Jin,Z. (2023). Comparing the RSA and elgamal encryption methods. Theoretical and Natural Science,13,270-278.
Export citation

Comparing the RSA and elgamal encryption methods

Zhan Jin *,1,
  • 1 Shanghai Guanghua Qidi College

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2753-8818/13/20240859

Abstract

In the realm of computer science, the speed and efficiency of data processing vary depending on the chosen algorithms and programming languages. This article delves into an exploration of which combinations can yield the highest overall performance. Starting with an introduction to the selected algorithms and languages, the underlying mathematical foundations and principles of each algorithm are presented. The research then shifts its focus to the practical aspect – translating these algorithms into executable code. Three specific combinations are tested: RSA algorithm implemented in Python, Elgamal algorithm implemented in Python, and RSA algorithm executed in C++. To ensure reliable results, each combination underwent 30 test iterations, with empirical data subsequently gathered. Two primary comparisons were conducted: the first pitting the Python-based RSA against the Python-based Elgamal, and the second contrasting the Python-based RSA with its C++ counterpart. From these tests, a compelling conclusion emerges. When it comes to transmitting encrypted messages and subsequently decrypting them, the RSA algorithm paired with Python emerges as the most optimal choice. Readers will gain a deeper understanding of the strengths and potential limitations of each pairing, equipping them to make more informed decisions in their cryptographic endeavors.

Keywords

Cryptology, RSA Algorithm, Elgamal Algorithm

[1]. Mallouli, F., Hellal, A., Saeed, N. S., & Alzahrani, F. A. (2019, June). A survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 173-176). IEEE.

[2]. Emmanuel, A. A., Okeyinka, A. E., Adebiyi, M. O., & Asani, E. O. (2021). A note on time and space complexity of rSA and ElGamal cryptographic algorithms. International Journal of Advanced Computer Science and Applications, 12(7).

[3]. Jintcharadze, E., & Iavich, M. (2020, September). Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In 2020 IEEE East-West Design & Test Symposium (EWDTS) (pp. 1-5). IEEE.

[4]. Jnr, P. K. A., Asante, M., & Otoo, L. (2023). A Comparative Study of RSA and ELGAMAL Cryptosystems. International Journal of Computing and Engineering, 4(1), 33-41.

[5]. Saho, N. J. G., & Ezin, E. C. (2020, October). Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm. In CARI 2020-Colloque Africain sur la Recherche en Informatique et en Mathématiques Apliquées.

[6]. ADEREMI, E., & OLUGBARA, O. (2022). COMPUTATIONAL COMPLEXITY OF RSA AND ELGAMAL CRYPTOGRAPHIC ALGORITHMS ON VIDEO DATA. Journal of Theoretical and Applied Information Technology, 100(15).

[7]. Zega, I., Budiman, M. A., & Efendi, S. (2023). Comparative Analysis of Ciphertext Enlargement on Generalization of the ElGamal and Multi-factor RSA. Data Science: Journal of Computing and Applied Informatics, 7(1), 44-50.

[8]. Harjito, B., Tyas, H. N., Suryani, E., & Wardani, D. W. (2022). Comparative Analysis of RSA and NTRU Algorithms and Implementation in the Cloud. International Journal of Advanced Computer Science and Applications, 13(3).

[9]. Thakkar, B., & Thankachan, B. (2020). A survey for comparative analysis of various cryptographic algorithms used to secure data on cloud. Int. J. Eng. Res. Technol, 9(08), 753-756.

[10]. Yousif, S. F. (2023). Performance comparison between RSA and El-Gamal algorithms for Speech Data Encryption and decryption. Diyala Journal of Engineering Sciences, 123-137.

Cite this article

Jin,Z. (2023). Comparing the RSA and elgamal encryption methods. Theoretical and Natural Science,13,270-278.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 3rd International Conference on Computing Innovation and Applied Physics

Conference website: https://www.confciap.org/
ISBN:978-1-83558-189-6(Print) / 978-1-83558-190-2(Online)
Conference date: 27 January 2024
Editor:Yazeed Ghadi
Series: Theoretical and Natural Science
Volume number: Vol.13
ISSN:2753-8818(Print) / 2753-8826(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).