Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's perfor...
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/116341/ http://psasir.upm.edu.my/id/eprint/116341/1/116341.pdf |
| _version_ | 1848866979798056960 |
|---|---|
| author | Mandangan, Arif Asbullah, Muhammad Asyraf Adnan, Syed Farid Syed Budiman, Mohammad Andri |
| author_facet | Mandangan, Arif Asbullah, Muhammad Asyraf Adnan, Syed Farid Syed Budiman, Mohammad Andri |
| author_sort | Mandangan, Arif |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes. |
| first_indexed | 2025-11-15T14:29:13Z |
| format | Article |
| id | upm-116341 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T14:29:13Z |
| publishDate | 2024 |
| publisher | Penerbit UTM Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-1163412025-03-26T04:00:37Z http://psasir.upm.edu.my/id/eprint/116341/ Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis Mandangan, Arif Asbullah, Muhammad Asyraf Adnan, Syed Farid Syed Budiman, Mohammad Andri The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. The research has two primary objectives. Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. Secondly, to determine which cryptosystem consumes the most time and memory for key generation, encryption, and decryption. The results indicate that ESF-RSA and RSA are the fastest in terms of key generation, ESF-RSA is the quickest for encryption, and Phony-RSA excels in decryption speed. Additionally, ESF-RSA demonstrates the lowest memory usage, whereas MRSA requires the highest memory allocation for all processes. Penerbit UTM Press 2024-06-23 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/116341/1/116341.pdf Mandangan, Arif and Asbullah, Muhammad Asyraf and Adnan, Syed Farid Syed and Budiman, Mohammad Andri (2024) Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis. Jurnal Teknologi, 86 (4). pp. 181-190. ISSN 0127-9696; eISSN: 2180-3722 https://journals.utm.my/jurnalteknologi/article/view/20723 10.11113/jurnalteknologi.v86.20723 |
| spellingShingle | Mandangan, Arif Asbullah, Muhammad Asyraf Adnan, Syed Farid Syed Budiman, Mohammad Andri Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title | Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title_full | Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title_fullStr | Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title_full_unstemmed | Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title_short | Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis |
| title_sort | comparative of rivest-shamir-adleman cryptosystem and its four variants using running time and memory consumption analysis |
| url | http://psasir.upm.edu.my/id/eprint/116341/ http://psasir.upm.edu.my/id/eprint/116341/ http://psasir.upm.edu.my/id/eprint/116341/ http://psasir.upm.edu.my/id/eprint/116341/1/116341.pdf |