Proceedings of International Conference on Applied Innovation in IT
2024/11/30, Volume 12, Issue 2, pp.71-76
Enhancement of Elgamal Cryptosystem; A Review
Paul Arhin and George Aggrey Abstract: This article reviews a large body of research on optimizing the ElGamal cryptosystem for increased hardware and software efficiency. Areas of effort identified in the research include, hardware acceleration, hybrid systems combining ElGamal with symmetric cryptosystems, software advancements through adjustments to mathematical difficulties, and hybrids with other asymmetric cryptosystems. There is a clear demonstration that hybrid systems that combine ElGamal with symmetric encryption and software improvement through adjustments to the mathematical difficulties are highly impactful with about 95% score based on the amount of research done in the area. This indicates the significance of these domains for the further evolution of the ElGamal cryptosystem. Hybrid systems which seek to combine Elgamal with symmetric cryptosystems, such as AES, has become a very crucial area that needs a high level of concentration. This ensures both high level of security and greater enhancement to the time complexity. Through these changes, performances were improved and computational overhead were decreased by optimizing the underlying mathematical operations and combining Elgamal with other symmetric algorithms. The article proposes ChaCha20-Poly1305 as a potential for further improvement in hybrid encryption.
Keywords: ElGamal Cryptosystem, Hybrid Encryption, Hardware Enhancement, Software Enhancement
DOI: 10.25673/118118
Download: PDF
References:
- H. Hajaje et al., “CPC-H2: Convolution Power-based Cryptosystem and Digital Signature,” 2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–7, 2021, [Online]. Available: https://doi: 10.1109/CCECE53047.2021. 9569033.
- R. Ranasinghe and P. Athukorala, "A generalization of the ElGamal public-key cryptosystem," Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, pp. 2395–2403, 2021. [Online]. Available: https://doi: 10.1080/09720529.2020.1857902.
- S. Kim and R. Kyung, "Study on Modified Public Key Cryptosystem Based on ElGamal and Cramer-Shoup Cryptosystems," 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), pp. 280–284, 2023, [Online]. Available: https://doi: 10.1109/CCWC57344.2023.10099297.
- A. Kurd and N. Besli, "Analysis of the Cryptography Methods for Design of Crypto-Processor," 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7, 2020, [Online]. Available: https://doi: 10.1109/HORA49412.2020.9152929.
- S. Guilley, L. Sauvage, J. Danger, T. Graba, and Y. Mathieu, "Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs," 2008 Second International Conference on Secure System Integration and Reliability Improvement, pp. 16–23, 2008, [Online]. Available: https://doi: 10.1109/SSIRI.2008.31.
- M. Mohan, M. Kavithadevi, and J. V., "Improved ElGamal Cryptosystem for Secure Data Transfer in IoT Networks," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 295–302, 2020, [Online]. Available: https://doi: 10.1109/I-SMAC49090. 2020.9243407.
- H. I. Hussein and W. M. Abduallah, "An efficient ElGamal cryptosystem scheme," International Journal of Computers and Applications, vol. 43, pp. 1088–1094, 2019, [Online]. Available: https://doi: 10.1080/1206212X.2019.1678799.
- G. Kim and S. Li, "Decryption speed up of ElGamal with composite modulus," PLoS ONE, vol. 15, 2020, [Online]. Available: https://doi: 10.1371/journal.pone. 0240248.
- M. Iavich, S. Gnatyuk, E. Jintcharadze, Y. Polishchuk, and R. Odarchenko, "Hybrid Encryption Model of AES and ElGamal Cryptosystems for Flight Control Systems," 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC), pp. 229–233, 2018, [Online]. Available: https://doi: 10.1109/MSNMC.2018. 8576289.
- D. Rachmawati, M. A. Budiman, and M. I. Wardhono, "Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm," 2018 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), pp. 49–54, 2018, [Online]. Available: https://doi: 10.1109/COMNETSAT.2018.8684121.
- M. Enriquez, D. W. Garcia, and E. R. Arboleda, "Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems," Indian Journal of Science and Technology, vol. 10, pp. 1–14, 2017, [Online]. Available: https://doi: 10.17485.IJST.2017.V10I27.105001.
- M. Bie, W. Li, T. Chen, L. Nan, and D. Yang, "An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC," Frontiers of Information Technology & Electronic Engineering, vol. 23, pp. 134–144, 2022, [Online]. Available: https://doi: 10.1631/FITEE.2000325.
- Y. Luo, X. Ouyang, J. Liu, and L. Cao, "An Image Encryption Method Based on Elliptic Curve ElGamal Encryption and Chaotic Systems," IEEE Access, vol. 7, pp. 38507–38522, 2019, [Online]. Available: https://doi: 10.1109/ACCESS.2019.2906052.
- P. Sharma, S. Sharma, and R. Dhakar, "Modified Elgamal Cryptosystem Algorithm (MECA)," 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), pp. 439–443, 2011, [Online]. Available: https://doi: 10.1109/ICCCT.2011.6075141.
- H. I. Hussein, R. J. Mstafa, A. Mohammed, and Y. M. Younis, "An Enhanced ElGamal Cryptosystem for Image Encryption and Decryption," 2022 International Conference on Computer Science and Software Engineering (CSASE), pp. 337–342, 2022, [Online]. Available: https://doi: 10.1109/CSASE51777.2022.9759643.
- M. Hwang, C. Chang, and K. Hwang, "An ElGamal-Like Cryptosystem for Enciphering Large Messages," IEEE Transactions on Knowledge and Data Engineering, vol. 14, pp. 445–446, 2002, [Online]. Available: https://doi: 10.1109/69.991728.
- T. Prantl et al., "Performance Evaluation for a Post-Quantum Public-Key Cryptosystem," 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 1–7, 2021, [Online]. Available: https://doi: 10.1109/IPCCC51483.2021.9679412.
- J. Jianwei, H. Wang, H. Zhang, S. Wang, and J. Liu, "Cryptanalysis of an ElGamal-Like Cryptosystem Based on Matrices Over Group Rings," Communications in Computer and Information Science, 2018, [Online]. Available: https://doi: 10.1007/978-981-13-5913-2_16.
- Maxrizal, S. Irawadi, and Sujono, "Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts," 2020 8th International Conference on Cyber and IT Service Management (CITSM), pp. 1–5, 2020, [Online]. Available: https://doi: 10.1109/CITSM50537.2020.9268832.
- A. Niemi and J. Teuhola, "Burrows‐Wheeler post‐transformation with effective clustering and interpolative coding," Software: Practice and Experience, vol. 50, pp. 1858–1874, 2020, [Online]. Available: https://doi: 10.1002/spe.2873.
- A. Pandey, I. Gupta, and D. Singh, "Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings," Journal of Mathematical Cryptology, vol. 15, pp. 266–279, 2020, [Online]. Available: https://doi: 10.1515/jmc-2019-0054.
- R. Zhou and Z. Lin, "An Improved Exponential ElGamal Encryption Scheme with Additive Homomorphism," 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS), pp. 25–27, 2022, [Online]. Available: https://doi: 10.1109/ICBCTIS55569.2022.00017.
- R. Ranasinghe and P. Athukorala, "A generalization of the ElGamal public-key cryptosystem," Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, pp. 2395–2403, 2021, [Online]. Available: https://doi: 10.1080/09720529.2020.1857902.
- O. Y. Owolabi, P. B. Shola, and M. B. Jibrin, "Improved Data Security System Using Hybrid Cryptosystem," International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, pp. 90–93, 2017. [Online]. Available: [Online]. Available: https://www.academia.edu/89014842/Improved_Data_Security_System_Using_Hybrid_Cryptosystem.
- D. Rachmawati, A. Harahap, and R. N. Purba, "A hybrid cryptosystem approach for data security by using triple DES algorithm and ElGamal algorithm," IOP Conference Series: Materials Science and Engineering, vol. 453, 2018, [Online]. Available: https://doi: 10.1088/1757-899X/453/1/012018.
- S. Rani and H. Kaur, "Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal," International Journal of Advanced Research in Computer Science, vol. 8, pp. 254–258, 2017, [Online]. Available: https://doi: 10.26483/ijarcs.v8i3.2990.
- D. Rachmawati, A. Sharif, and Ericko, "Hybrid Cryptosystem Combination Algorithm Of Hill Cipher 3x3 and Elgamal To Secure Instant Messaging For Android," Journal of Physics: Conference Series, vol. 1235, 2019, [Online]. Available: https://doi: 10.1088/1742-6596/1235/1/012074.
- J. P. Degabriele et al., "The Security of ChaCha20-Poly1305 in the Multi-User Setting," Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021. [Online]. Available: https://doi: 10.1145/3460120.3484814.
- Li, B., Feng, Y., Xiong, Z., Yang, W., & Liu, G. (2021). "Research on AI Security Enhanced Encryption Algorithm of Autonomous IoT Systems." Information Sciences, vol. 575, pp. 379-398. [Online]. Available: https://doi: 10.1016/J.INS.2021.06.016.
- Blackledge, J., & Mosola, N. (2020). "Applications of Artificial Intelligence to Cryptography." Transactions on Machine Learning and Artificial Intelligence, vol. 8, pp. 21-60. [Online]. Available: https://doi: 10.14738/tmlai.83.8219.
|

HOME

- Call for Papers
- Paper Submission
- For authors
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|