Evaluation of different implementations of the RSA encryption system
Abstract
With the increase in the flow of information between different devices, encryption systems have become essential to ensure the confidentiality and integrity of data. The RSA algorithm stands out as an effective option to provide data security. This work presents ongoing research that evaluates RSA implementations, considering different languages and cryptographic libraries. Preliminary findings, in a single programming language, already indicate significant differences in the average execution time of each encryption process.References
Gupta, S. and Sharma, J. (2012). A hybrid encryption algorithm based on rsa and diffie-hellman. In 2012 IEEE International Conference on Computational Intelligence and Computing Research, pages 1–4.
Imam, R., Areeb, Q. M., Alturki, A., and Anwer, F. (2021). Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE Access, 9:155949–155976.
Islam, M., Islam, M., Islam, N., and Shabnam, B. (2018). A modified and secured rsa public key cryptosystem based on “n” prime numbers. Journal of Computer and Communications, 6:78–90.
Jintcharadze, E. and Iavich, M. (2020). Hybrid implementation of twofish, aes, elgamal and rsa cryptosystems. In 2020 IEEE East-West Design & Test Symposium (EWDTS), pages 1–5.
PYPL (2024). Pypl - popularity of programming language. Disponível em: [link]. Acesso em: 27 jun. 2024.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120–126.
Singh, S. R., Khan, A. K., and Singh, S. R. (2016). Performance evaluation of rsa and elliptic curve cryptography. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pages 302–306.
Stallings, W. and Vieira, D. (2008). Criptografia e segurança de redes: princípios e práticas. Pearson Prentice Hall.
TIOBE (2024). Tiobe index - the software quality company. Disponível em: [link]. Acesso em: 27 jun. 2024.
Imam, R., Areeb, Q. M., Alturki, A., and Anwer, F. (2021). Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE Access, 9:155949–155976.
Islam, M., Islam, M., Islam, N., and Shabnam, B. (2018). A modified and secured rsa public key cryptosystem based on “n” prime numbers. Journal of Computer and Communications, 6:78–90.
Jintcharadze, E. and Iavich, M. (2020). Hybrid implementation of twofish, aes, elgamal and rsa cryptosystems. In 2020 IEEE East-West Design & Test Symposium (EWDTS), pages 1–5.
PYPL (2024). Pypl - popularity of programming language. Disponível em: [link]. Acesso em: 27 jun. 2024.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120–126.
Singh, S. R., Khan, A. K., and Singh, S. R. (2016). Performance evaluation of rsa and elliptic curve cryptography. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pages 302–306.
Stallings, W. and Vieira, D. (2008). Criptografia e segurança de redes: princípios e práticas. Pearson Prentice Hall.
TIOBE (2024). Tiobe index - the software quality company. Disponível em: [link]. Acesso em: 27 jun. 2024.
Published
2024-09-16
How to Cite
ROSA, Ana Carla Quallio; CAMPIOLO, Rodrigo.
Evaluation of different implementations of the RSA encryption system. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE ONGOING WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 24. , 2024, São José dos Campos/SP.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2024
.
p. 347-352.
DOI: https://doi.org/10.5753/sbseg_estendido.2024.242773.
