Cryptographic Computation Using EIGamal Algorithm in 32-bit Computing System

被引:0
作者
Rosly, Nurul Atiqah [1 ]
Aziz, Mohd Zafran Abdul [1 ]
Hashim, Habibah [1 ]
Adnan, Syed Farid Syed [1 ]
Isa, Mohd Anuar Mat [1 ]
机构
[1] Univ Teknol MARA, Fac Elect Engn, Shah Alam 40450, Malaysia
来源
PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING (CASE-13) | 2013年 / 45卷
关键词
component; ElGamal; Diffie-Hellman; 32-bits integers; DHKE; key exchange protocol; asymmetric; GMP; cryptography; security; trust; privacy; encryption; decryption; public key; precision computation; greater common divisor (GCD); Extended Euclidean;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart Computing provides ease of use in term of mobility in the low power computing devices such as smartphone, tablet and experimental board (e.g. Raspberry Pi). Low power constraint and low computation capability require a lightweight security system and networking protocol. This paper presents an analysis of EIGamal encryption system for securing data communication through the computer. The objectives of this paper are to study EIGamal algorithm in 32bit integer computation and to implement data encryption using the EIGamal algorithm using 32-bit integers. EIGamal is a continuation of Diffie-Hellman key exchange algorithm. However, EIGamal encryption system uses asymmetric key encryption and decryption. EIGamal uses a public key to encrypt and private a key to decrypt messages where private key and public key are different. An experiment was conducted to evaluate the maximum number of integers that can be computed in 32 bit computer system using standard 32 bit GCC compiler in Debian 6. Furthermore, an exploration of computing capabilities and performance measurement of the EIGamal algorithm using C language is presented in this paper.
引用
收藏
页码:63 / 67
页数:5
相关论文
共 10 条
  • [1] [Anonymous], 2005, 27001 INF SEC MAN SP
  • [2] [Anonymous], 1998, SEMINUMERICAL ALGORI
  • [3] Cheng H., 2009, 2009 IET INT RADAR C, P1
  • [4] ELGAMAL T, 1985, IEEE T INFORM THEORY, V31
  • [5] Feruza Y. S., 2007, INT J MULTIMEDIA UBI, V2
  • [6] Li N, 2010, I C WIREL COMM NETW
  • [7] Mohd Anuar Mat Isa, 2012, 2012 INT S COMP APPL
  • [8] Raymond J.-F., 2000, IEEE T INFORM THEORY
  • [9] Not so different after all: A cross-discipline view of trust
    Rousseau, DM
    Sitkin, SB
    Burt, RS
    Camerer, C
    [J]. ACADEMY OF MANAGEMENT REVIEW, 1998, 23 (03) : 393 - 404
  • [10] An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange
    Yang Guang-ming
    Chen Jin-ming
    Lu Ya-feng
    Ma Da-Ming
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 303 - 306