CFP last date
20 May 2024
Reseach Article

Analysis and Performance Characteristics of Cryptosystem using Image Files

by A. Naresh Reddy, Rakesh Nayak, S. Baboo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 22
Year of Publication: 2012
Authors: A. Naresh Reddy, Rakesh Nayak, S. Baboo
10.5120/8340-1561

A. Naresh Reddy, Rakesh Nayak, S. Baboo . Analysis and Performance Characteristics of Cryptosystem using Image Files. International Journal of Computer Applications. 51, 22 ( August 2012), 7-11. DOI=10.5120/8340-1561

@article{ 10.5120/8340-1561,
author = { A. Naresh Reddy, Rakesh Nayak, S. Baboo },
title = { Analysis and Performance Characteristics of Cryptosystem using Image Files },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 22 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number22/8340-1561/ },
doi = { 10.5120/8340-1561 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:50:59.656976+05:30
%A A. Naresh Reddy
%A Rakesh Nayak
%A S. Baboo
%T Analysis and Performance Characteristics of Cryptosystem using Image Files
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 22
%P 7-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to achieve the security for the e-business application, generally the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The RSA and NTRU belong to the category of asymmetric key cryptosystem. RSA is one of the oldest and the most widely used public key cryptographic algorithms. It was the first algorithm known to be suitable for signing as well as encryption. The system works on two large prime numbers, from which the public and private keys will be generated. NTRU (Nth degree truncated Polynomial ring) is a collection of mathematical algorithms based on manipulating lists of very small Integers. NTRU is the first secure public key cryptosystem. The keys are generated by having small potent polynomials from the ring of truncated polynomials. Finally we proceed with the key generation, encryption and decryption of the image required by implementing the algorithms of the asymmetric key cryptosystems. This paper presents the comparative study of RSA and NTRU algorithms for images as input and the results were observed, analyzed and compared so as to identify which method is appropriate to the business needs.

References
  1. Whitefield Diffie, Martin E Hellman " New directions in Cryptography " IEEE Information theory , June 2325, 1975.
  2. Joffrey Hoffstein , Jill Pipher , Joseph HSilverman " NTRU – A ring based public key cryptosystem".
  3. Joffrey Hoffstein , Joseph H Silverman " Optimizations for NTRU"
  4. Collen Marie O'Rourke " Efficient NTRU implementations"
  5. Wikipedia , the free encyclopedia " NTRU Cryptosystems Inc. ,"
  6. A. Huffman, "A method for the construction of minimum redundancy codes," Proc. IRE, vol. 40,pp. 1098–1101, Sept. 1952.
  7. R. L. Rivest , A. Shamir, L. Adleman "A method for obtaining digital signatures and Public-Key Cryptosystems".
  8. www. ntru. com
  9. DI management - RSA Algorithm [10 Challa Narasimham Jayaram Pradhan Evalution Of Performance Characterstictis of Cryptosystem Using Text Files1
  10. Rakesh Nayak, C.V.Sastry, Jayaram Pradhan,”An algorithmic Comparison between polynomial base and Matrix based NTRU cryptosystem”, International Journal of Computer and Network Security(IJCNS) Vol.2, No.7,July 2010.
  11. Jeffry Hoffstein, Jill Pipher and Joseph H. Silverman "NTRUA High Speed Public Key Cryptosystem", PrePrint Presented AHe Hump Session Of Euro Crypt 96,1996.
Index Terms

Computer Science
Information Sciences

Keywords

Asymmetric Key NTRU RSA