COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS

The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's perfor...

Full description

Bibliographic Details
Published in:JURNAL TEKNOLOGI-SCIENCES & ENGINEERING
Main Authors: Mandangan, Arif; Asbullah, Muhammad Asyraf; Adnan, Syed Farid Syed; Budiman, Mohammad Andri
Format: Article
Language:English
Published: PENERBIT UTM PRESS 2024
Subjects:
Online Access:https://www-webofscience-com.uitm.idm.oclc.org/wos/woscc/full-record/WOS:001252697700011
author Mandangan
Arif; Asbullah
Muhammad Asyraf; Adnan
Syed Farid Syed; Budiman
Mohammad Andri
spellingShingle Mandangan
Arif; Asbullah
Muhammad Asyraf; Adnan
Syed Farid Syed; Budiman
Mohammad Andri
COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
Engineering
author_facet Mandangan
Arif; Asbullah
Muhammad Asyraf; Adnan
Syed Farid Syed; Budiman
Mohammad Andri
author_sort Mandangan
spelling Mandangan, Arif; Asbullah, Muhammad Asyraf; Adnan, Syed Farid Syed; Budiman, Mohammad Andri
COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
JURNAL TEKNOLOGI-SCIENCES & ENGINEERING
English
Article
The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes.
PENERBIT UTM PRESS
0127-9696
2180-3722
2024
86
4
10.11113/jurnalteknologi.v86.20723
Engineering
gold
WOS:001252697700011
https://www-webofscience-com.uitm.idm.oclc.org/wos/woscc/full-record/WOS:001252697700011
title COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
title_short COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
title_full COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
title_fullStr COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
title_full_unstemmed COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
title_sort COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
container_title JURNAL TEKNOLOGI-SCIENCES & ENGINEERING
language English
format Article
description The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes.
publisher PENERBIT UTM PRESS
issn 0127-9696
2180-3722
publishDate 2024
container_volume 86
container_issue 4
doi_str_mv 10.11113/jurnalteknologi.v86.20723
topic Engineering
topic_facet Engineering
accesstype gold
id WOS:001252697700011
url https://www-webofscience-com.uitm.idm.oclc.org/wos/woscc/full-record/WOS:001252697700011
record_format wos
collection Web of Science (WoS)
_version_ 1809679210369777664