Skip to content

A Comparative Analysis of Public Key Cryptography

Notifications You must be signed in to change notification settings

Soham-coder/ecc_vs_rsa

Repository files navigation

visitors

Title

A Comparative Analysis of Public Key Cryptography

@@ Abstract—@@
In the globalization era, cryptography becomes more popular and powerful; in fact it is very important in many areas (i.e. mathematics, computer science, networks, etc). Cryptography is one of the main constituent of computer security. To meet a user's needs cryptographic algorithm needs to be selected on the basis of attributes like security and performance. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. Cryptography systems can be broadly classified into two categories: Symmetric encryption algorithms and Asymmetric encryption algorithms RSA and ECC are asymmetric key cryptographic algorithms. This presentation provides an overview and comparison between the RSA cryptosystem and elliptic curve cryptography, which both focus on sending and receiving messages. RSA is the most popular public-key cryptosystem today but long- term trends such as the proliferation of smaller, simpler devices and increasing security needs will make continued reliance on RSA more challenging over time. Hence Elliptic Curve Cryptography (ECC) is a suitable alternative. Here, the algorithms studied and compared are RSA and ECC. The RSA Cryptosystem and elliptic curve cryptography theories are quite similar but elliptic curve cryptography is more complicated.

  -RSA is a cryptosystem, which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, i.e. on the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977.

  -Elliptic Curve Cryptography (ECC) was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz as an alternative mechanism for implementing public-key cryptography. Public-key algorithms create a mechanism for sharing keys among large numbers of participants or entities in a complex information system. ECC is based on discrete logarithms that are much more difficult to challenge at equivalent key lengths. The security of a public key system using elliptic curves is based on difficulty of computing discrete algorithms in the group of points on an elliptic curve defined over a finite field. Elliptic curve equation over a finite field Fp is y2 =( x3 + ax + b) mod P Here, y, x, a and b are all within Fp, and p is a integers modulo p. a and b is the coefficients which determine what points will be on the curve. Curve coefficients have to fulfill one condition that is: 4a3 + 27b2 ≠ 0 This condition guarantees that the curve will not contain any singularities.
Goals
- Implementation of RSA and ECC data encryption techniques in MATLAB environment and to improve their performance metrics such as speed, code complexity and run time.

- MATLAB has difficulty in working with large prime number computation. So we are trying to improve computation time by means of  Variable Precision Integers(VPI) and other methods.
Bibliography
Guide

Directory structure

Directory structure

Instructions to run

   ecc : Open the files of ./ecc folder in matlab and run the main.m
   rsa : Open the files of ./rsa/RSA/ folder in matlab and run the rsa.m

Papier presentation

Ppt

Prizes

  • Won 2nd prize in the event PAPIER(Convolution) conducted by JU Electrical Engg., department sponsored by IET & IEEE Signal Processing Society
  • Rs.3000/- cash prize
Ceremony pics

ceremony pic1 ceremony pic2 ceremony pic3 ceremony pic4 ceremony pic5 ceremony pic6 ceremony pic7

About

A Comparative Analysis of Public Key Cryptography

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published