COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS

Authors

  • Arif Mandangan Mathematics, Real-Time Graphics and Visualization Laboratory, Faculty of Sciences and Natural Resources, Universiti Malaysia Sabah, 88400 Kota Kinabalu, Sabah, Malaysia https://orcid.org/0000-0003-4762-4534
  • Muhammad Asyraf Asbullah Institute for Mathematical Research, Universiti Putra Malaysia, 43400 UPM Serdang, Malaysia https://orcid.org/0000-0002-0778-4456
  • Syed Farid Syed Adnan School of Electrical Engineering, College of Engineering, Universiti Teknologi Mara, 40450 Shah Alam, Malaysia
  • Mohammad Andri Budiman Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia https://orcid.org/0000-0002-7716-2206

DOI:

https://doi.org/10.11113/jurnalteknologi.v86.20723

Keywords:

Cryptosystem, single precision, encryption, running time, memory consumption

Abstract

The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes.

References

Canetti, R., Halevi, S. and Katz, J. 2004. Chosen-ciphertext Security from Identity-based Encryption. Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Springer Berlin Heidelberg. 23: 207-222.

Doi: https://doi.org/10.1007/978-3-540-24676-3_13.

Barakat, M., Eder, C. and Hanke, T., 2018. An Introduction to Cryptography. Timo Hanke at RWTH Aachen University. 1-145. Retrieved: 1 July 2023.

Alqad, Z., Oraiqat, M., Almujafet, H., Al-Saleh, S., Al Husban, H. and Al-Rimawi, S. 2019. A New Approach for Data Cryptography. International Journal of Computer Science and Mobile Computing. 8(9): 30-48.

Saloma, A. 2006. Public-key Cryptography. 2nd edition. Springer Science & Business Media.

Pal, S. K. and Mishra, S. 2019. An TPM based Approach for Generation of Secret Key. International Journal of Computer Network and Information Security. 11(10): 45-50.

Doi: https://doi.org/10.5815/ijcnis.2019.10.06.

Menezes, A. J., Van Oorschot, P. C. and Vanstone, S. A. 2018. Handbook of Applied Cryptography. CRC Press.

Doi: https://doi.org/10.1201/9781439821916.

Asbullah, M. A. and Ariffin, M. R. K. 2014. Comparative Analysis of Three Asymmetric Encryption Schemes based Upon the Intractability of Square Roots Modulo N= p^ 2 q. 4th International Cryptology and Information Security Conference. 24-26.

Diffie, W. and Hellman, M. E. 2022. New Directions in Cryptography. Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 365-390.

Doi: https://doi.org/10.1145/3549993.3550007.

Hue, S. Y., Sarmin, N. H., Ismail, E. S. and Chin, J. J. 2020. December. Easy Simple Factoring-based Digital Signature Scheme. 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). 1-4). IEEE.

Doi: https://doi.org/10.23919/ICITST51030.2020.9351341.

Rivest, R.L., Shamir, A. and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM. 21(2): 120-126.

Doi: https://doi.org/10.1145/359340.359342.

Al Hasib, A. and Haque, A. A. M. M. 2008. A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography. 2008 Third International Conference on Convergence and Hybrid Information Technology. IEEE. 2: 505-510.

Doi: https://doi.org/10.1109/ICCIT.2008.179.

Somsuk, K. 2017, November. The New Equation for RSA's Decryption Process Appropriate with High Private Key Exponent. 2017 21st International Computer Science and Engineering Conference (ICSEC). IEEE. 1-5.

Doi: https://doi.org/10.1109/ICSEC.2017.8443858.

Somsuk, K. 2021. A New Methodology to Find Private Key of RSA Based on Euler Totient Function. Baghdad Science Journal. 18(2): 338-348.

Doi: https://doi.org/10.21123/bsj.2021.18.2.0338.

Islam, M. A., Islam, M. A., Islam, N. and Shabnam, B. 2018. A Modified and Secured RSA Public Key Cryptosystem based on “n” Prime Numbers. Journal of Computer and Communications. 6(03): 78.

Doi: https://doi.org/10.4236/jcc.2018.63006.

Imam, R., Anwer, F. and Nadeem, M. 2022. An Effective and Enhanced RSA based Public Key Encryption Scheme (XRSA). International Journal of Information Technology. 14(5): 2645-2656. Doi: https://doi.org/10.1007/s41870-022-00993-y

Ismail, E. S., Zaharidan, M. Z. and Samat, F. A. I. E. Z. A. 2018. ESF: Suatu Kriptosistem Mudah Ringkas Berasaskan Masalah Pemfaktoran. Journal of Quality Measurement and Analysis JQMA. 14(2): 81-89.

Raghunandan, K. R., Aithal, G. and Shetty, S. 2019. Secure RSA Variant System to Avoid Factorization Attack using Phony Modules and Phony Public Key Exponent. Int J Innov Technol Exploring Eng (IJITEE). 8(9).

Doi: https://doi.org/10.35940/ijitee.I7807.078919.

Puneeth, B. R., Raghunandan, K. R., Bhavya, K., Shetty, S., NS, K. R., Dodmane, R. and Islam, S. M. 2022. Preserving Confidentiality against Factorization Attacks using Fake Modulus ($zeta $) Approach in RSA and its Security Analysis. 2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) IEEE. 1-6.

Asbullah, M. A., Ariffin, M. R. K. and Mahad, Z. 2016. Analysis on the Rabin-p Cryptosystem. AIP Conference Proceedings AIP Publishing. 1787(1).

Doi: https://doi.org/10.1063/1.4968151.

Vuillaume, C. 2003. Efficiency Comparison of Several RSA Variants Master Thesis. Fachbereich Informatik der TUDarmstadt.

Downloads

Published

2024-06-02

Issue

Section

Science and Engineering

How to Cite

COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS. (2024). Jurnal Teknologi (Sciences & Engineering), 86(4), 181-190. https://doi.org/10.11113/jurnalteknologi.v86.20723