Academic literature on the topic 'ElGamal cryptographic system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ElGamal cryptographic system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ElGamal cryptographic system"

1

Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.

Full text
Abstract:
Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and memory usage over variable file sizes. After processing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. This system is also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. This system is using C# programming language and SQL Server to store mail messages.
APA, Harvard, Vancouver, ISO, and other styles
2

Narasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.

Full text
Abstract:
In the network security system cryptography plays a vital role for the secure transmission of information. Cryptography is a process of integrating and transferring the data to the genuine users against any attacks. There are two types of Cryptographic algorithm: Symmetric and Asymmetric algorithms. In the symmetric type cryptography, single key is used for both encryption and decryption. Symmetric algorithms are fast and simple. Asymmetric cryptographic algorithm uses different keys such as public key to encrypt the message at sender and private key which is known only to receiver for decrypting the encrypted message. Asymmetric algorithms are more secure and difficult, to decrypt the message unless hacker acquires the knowledge of private key. A new Asymmetric algorithm with Error Detection and Correction mechanism is proposed that can reduce hardware, and improves decryption time and security. Proposed Asymmetric algorithm uses the few properties of: RSA, Diffie-Hellman and ElGamal Algorithms. Performance of asymmetric algorithms is compared with proposed algorithm, which is designed using Verilog HDL. Algorithms are synthesized, simulated, implemented using Vivado and targeted for Artix-7 XC7A100T-1CSG324Carchitecture.Chipscope Pro logic analyzer-Virtual Input Output core is binded to design for hardware debugging, to monitor and capture the output signals at selected specified state by applying random input stimuli at runtime in Nexys4 DDR FPGA Board.
APA, Harvard, Vancouver, ISO, and other styles
3

Rofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (June 9, 2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.

Full text
Abstract:
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated. Previous research on safes’ security has ever been done. The weakness of the study is there is no security system using cryptographic algorithms for data security. The development of a safes security system by implementing ElGamal algorithms is done by following the engineering approach with the stages of methods analysis and design system, implementation and testing of the analysis and the discussion of the overall system. In the analysis and design of mathematical models using ElGamal algorithms, uses fast powering theorems and applications design uses Object OrientedProgramming. In the analysis of hardware refers to the datasheet and calculation of the value of electrical characteristics of the circuit. In the safes lock system, the outcome of the research is a safes prototype which is equipped with enhancements that include a series of processing algorithms, the data viewer, a wireless data transfer device, the Android smartphone as a system of user authorization. For the lock safes systems is using a locked solenoid. The control system is done by a lock safes android smartphone via Bluetooth communication. The test results also indicate the system will open the safes if the code and the public key is entered correctly, and the system will not open if one of the codes or the public-keys are wrong or both are wrong.
APA, Harvard, Vancouver, ISO, and other styles
4

Seo, Hwa-Jeong, and Ho-Won Kim. "EC-ELGAMAL Homomorphic Cryptography based E-voting System." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 909–16. http://dx.doi.org/10.6109/jkiice.2013.17.4.909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.

Full text
Abstract:
Data encryption is well known as essential for today’s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government’s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.
APA, Harvard, Vancouver, ISO, and other styles
6

Saputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (March 8, 2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.

Full text
Abstract:
Keamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest–Shamir–Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi asimetris dapat dikembangkan menggunakan algoritma-algoritma tersebut. Kata kunci : cryptography, encryption, decryption, public key
APA, Harvard, Vancouver, ISO, and other styles
7

Sapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.

Full text
Abstract:
At present, due to the various hacking approaches, the protection for any data transmitted through any channel or mode is one of the important issues. Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers. Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including AES use a larger size of key simultaneously and there exists security problems due to hacking approaches. To illustrate the protection level and hacking problems, a new ECC is presented as well as by employing scalar duplication, the synchronous key is generated and consists of point doubling and point addition. The created focuses are encrypted before transmission by using ECC-Elgamal-Holomorphic (ECCEH) and transferred through a distant channel and encipher data is failed at the receiver using ECCEH which includes the reverse process. The unique standards of cryptography context have been generated by MATLAB; the defined framework has endeavored to the extent that speed, delay as well as control, and many others are accepted in MATLAB 2017a. The user of the sender, the original information is transformed into integer value by employing Holomorphic and encodes it by utilizing the Elgamal ECC algorithm which employs point doubling and point addition. The encoded information is uploaded into the cloud for storage, here www.thingspeak.com is utilized for storage. When the user presents at the receiver request the cloud to access from it, initially the cloud server authenticates the access control strategies of the requester, and then access is provided by the cloud server. If the user authenticates the strategies, then encoded data can download and the original data is decoded by synchronous key employing ECC- Elgamal algorithm. Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods and found to be 12%, 31%, 24%, and 8% progress concerned with packet delivery ratio, latency, outturn and execution time.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yingjie, Jianhua Li, and Ling Tie. "A simple protocol for deniable authentication based on ElGamal cryptography." Networks 45, no. 4 (2005): 193–94. http://dx.doi.org/10.1002/net.20062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ramadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (April 1, 2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.

Full text
Abstract:
The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending data especially images, security aspects, confidentiality and efficiency of data storage is very necessary. If the important information falls into the wrong hands, it will cause unwanted things, for example manipulation of images with negative shapes and can harm the owner of the image. One method used to maintain data security is cryptography using one of the techniques, Elgamal. The strength of this algorithm lies in the difficulty of calculating discrete algorithms on prime integers in which multiplication operations are performed. In this research, the writer combines Hill Cipher to do image encryption and Elgamal Algorithm to decrypt the key of Hill Cipher. The image is first encrypted using the Hill Cipher, then the Hill Cipher key is encrypted using the Elgamal Algorithm. The implementation of the system uses the programming language Visual Basic Net 2010. The results of the implementation with the initial encrypted image has 4282.85 milliseconds with random images, while the encrypted image will be re-described as having 20442.84 milliseconds with the image returned to the beginning.
APA, Harvard, Vancouver, ISO, and other styles
10

Putra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (February 28, 2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.

Full text
Abstract:
The biggest weakness of Elliptic Curve Cryptography is the difficulty of points counting in elliptic curve which affects the process time. This paper considers a method of simplifying the counting in Elliptic Curve Cryptography and quickening the process time without decreasing the security level. Using ElGamal Algorithm as method of encryption, the implementation also involves Rabin-Miller Prime Number Generator to generate the public key. The system is tested using five different text files with different sizes and lengths. The result shows that by limiting the value of a and b to 1 in the elliptic curve function and also limiting the prime number down to two digits, successfully quicken the process time, the encryption process also takes only a small amount of time.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ElGamal cryptographic system"

1

Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.

Full text
Abstract:
Data security will play a central role in the design of future IT systems. The PC has been a major driver of the digital economy. Recently, there has been a shift towards IT applications realized as embedded systems, because they have proved to be good solutions for many applications, especially those which require data processing in real time. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most of these embedded applications will be wireless, which makes the communication channel vulnerable. The implementation of cryptographic systems presents several requirements and challenges. For example, the performance of algorithms is often crucial, and guaranteeing security is a formidable challenge. One needs encryption algorithms to run at the transmission rates of the communication links at speeds that are achieved through custom hardware devices. Public-key cryptosystems such as RSA, DSA and DSS have traditionally been used to accomplish secure communication via insecure channels. Elliptic curves are the basis for a relatively new class of public-key schemes. It is predicted that elliptic curve cryptosystems (ECCs) will replace many existing schemes in the near future. The main reason for the attractiveness of ECC is the fact that significantly smaller parameters can be used in ECC than in other competitive system, but with equivalent levels of security. The benefits of having smaller key size include faster computations, and reduction in processing power, storage space and bandwidth. This makes ECC ideal for constrained environments where resources such as power, processing time and memory are limited. The implementation of ECC requires several choices, such as the type of the underlying finite field, algorithms for implementing the finite field arithmetic, the type of the elliptic curve, algorithms for implementing the elliptic curve group operation, and elliptic curve protocols. Many of these selections may have a major impact on overall performance. In this dissertation a finite field from a special class called the Optimal Extension Field (OEF) is chosen as the underlying finite field of implementing ECC. OEFs utilize the fast integer arithmetic available on modern microcontrollers to produce very efficient results without resorting to multiprecision operations or arithmetic using polynomials of large degree. This dissertation discusses the theoretical and implementation issues associated with the development of this finite field in a low end embedded system. It also presents various improvement techniques for OEF arithmetic. The main objectives of this dissertation are to --Implement the functions required to perform the finite field arithmetic operations. -- Implement the functions required to generate an elliptic curve and to embed data on that elliptic curve. -- Implement the functions required to perform the elliptic curve group operation. All of these functions constitute a library that could be used to implement any elliptic curve cryptosystem. In this dissertation this library is implemented in an 8-bit AVR Atmel microcontroller.
Dissertation (MEng (Computer Engineering))--University of Pretoria, 2006.
Electrical, Electronic and Computer Engineering
unrestricted
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ElGamal cryptographic system"

1

Kattamuri, Sreerama Murthy, Vijayalakshmi Kakulapati, and Pallam Setty S. "Performance Analysis of Mail Clients on Low Cost Computer With ELGamal and RSA Using SNORT." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 332–53. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3870-7.ch020.

Full text
Abstract:
An intrusion detection system (IDS) focuses on determining malicious tasks by verifying network traffic and informing the network administrator for restricting the user or source or source IP address from accessing the network. SNORT is an open source intrusion detection system (IDS) and SNORT also acts as an intrusion prevention system (IPS) for monitoring and prevention of security attacks on networks. The authors applied encryption for text files by using cryptographic algorithms like Elgamal and RSA. This chapter tested the performance of mail clients in low cost, low power computer Raspberry Pi, and verified that SNORT is efficient for both algorithms. Within low cost, low power computer, they observed that as the size of the file increases, the run time is constant for compressed data; whereas in plain text, it changed significantly.
APA, Harvard, Vancouver, ISO, and other styles
2

Özyılmaz, Çağla, and Ayşe Nallı. "Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem." In Implementing Computational Intelligence Techniques for Security Systems Design, 163–81. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2418-3.ch008.

Full text
Abstract:
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other ElGamal cryptosystem by using the new sequence. In addition, they have compared that the new ElGamal cryptosystems and ElGamal cryptosystem in terms of cryptography. Then the authors have defined the third ElGamal cryptosystem. They have, particularly, called the new system as composite ElGamal cryptosystem. The authors made an application of composite ElGamal cryptosystem. Finally, the authors have compared that composite ElGamal cryptosystem and ElGamal cryptosystem in terms of cryptography and they have obtained that composite ElGamal cryptosystem is more advantageous than ElGamal cryptosystem.
APA, Harvard, Vancouver, ISO, and other styles
3

Çelemoğlu, Çağla, Selime Beyza Özçevik, and Şenol Eren. "Power Pell Sequences, Some Periodic Relations of These Sequences, and a Cryptographic Application With Power Pell Sequences." In Applications of Computational Science in Artificial Intelligence, 21–43. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9012-6.ch002.

Full text
Abstract:
Here, first of all, the authors investigated power Fibonacci sequence modulo k and formulas for the periods of these sequences, based on the period of the Fibonacci sequence modulo k. And then, the authors described a new power sequence for positive integer modulus. They named these sequences power Pell sequences modulo k. After that the authors determined those positive integer moduli for which this sequence exists and the number of such sequences for a given modulo k. In addition, the authors provide formulas for the periods of these sequences, based on the period of the Pell sequence modulo k, and they studied sequence/subsequence relationships between power Pell sequences. Finally, the authors examined ElGamal cryptosystem which is one of the asymmetric cryptographic systems and ElGamal cryptosystem which is obtained by using some power sequences. And they obtained asymmetric cryptographic applications by using power Pell sequences which the authors described.
APA, Harvard, Vancouver, ISO, and other styles
4

Mogollon, Manuel. "Confidentiality." In Cryptography and Security Services, 101–21. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch005.

Full text
Abstract:
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically related, and if it is possible to make one of the keys public and still maintain the algorithm security, then the system is called public-key. The most used public-key ciphers, the Pohlig-Hellman algorithm, the RSA algorithm, the ElGamal algorithm, and Diffie-Hellman, are discussed in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Kun. "Theory and Practice of Secure E-Voting Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems, 428–59. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch017.

Full text
Abstract:
Electronic voting is a popular application of cryptographic and network techniques to e-government. Most of the existing e-voting schemes can be classified into two categories: homomorphic voting and shuffling-based voting. In a homomorphic voting, an encryption algorithm with special homomorphic property (e.g. ElGamal encryption or Paillier encryption) is employed to encrypt the votes such that the sum of the votes can be recovered without decrypting any single vote. An advantage of homomorphic voting is efficient tallying. Tallying in homomorphic voting only costs one single decryption operation for each candidate. In this chapter, the existing e-voting solutions in both categories are surveyed and analysed. The key security properties in both categories are presented and then the existing e-voting schemes in each category are checked against the corresponding security properties. Security and efficiency of the schemes are analysed and the strongest security and highest efficiency achievable in each category is estimated. Problems and concerns about the existing solutions including vulnerability to malicious voters and (or) talliers, possible failure of complete correctness, imperfect privacy, dependence on computational assumptions, and exaggerated efficiency are addressed. New approaches will be proposed in both kinds of solutions to overcome the existing drawbacks in them. In homomorphic e-voting, the authors deal with possibly malicious voters and aim at efficient vote validity check to achieve strong and formally provable soundness and privacy. It can be implemented through new zero knowledge proof techniques, which are both efficient and provably secure. In mix-network-based e-voting, the authors deal with possibly deviating operations of both voters and talliers and aim at efficient proof of validity of shuffling, which guarantees the desired security properties and prevent attacks from malicious participants. It can be based on inspiring linear algebra knowledge and the new zero knowledge proof of existence of secret permutation.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ElGamal cryptographic system"

1

Atiqah Rosly, Nurul, Abdul Aziz Mohd Zafran, Hashim Habibah, Syed Adnan Syed Farid, and Mat Isa Mohd Anuar. "Cryptographic Computation Using ElGamal Algorithm in 32-bit Computing System." In Third International Conference on Control, Automation and Systems Engineering (CASE-13). Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/case-13.2013.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nalwaya, Priya, Varun P. Saxena, and Pulkit Nalwaya. "A Cryptographic Approach Based on Integrating Running Key in Feedback Mode of ElGamal System." In 2014 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2014. http://dx.doi.org/10.1109/cicn.2014.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"A COMPARITIVE STUDY OF ELGAMAL BASED CRYPTOGRAPHIC ALGORITHMS." In 6th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002593600790084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arta, Yudhi, Hendra Pratama, Apri Siswanto, Abdul Syukur, and Panji Rachmat Setiawan. "Design of Web Login Security System using ElGamal Cryptography." In The Second International Conference on Science, Engineering and Technology. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0009186802680273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boruah, Debabrat, and Monjul Saikia. "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography