Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiat...
Saved in:
Published in | 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) pp. 926 - 929 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.02.2020
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/TCSET49122.2020.235572 |
Cover
Abstract | This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiation with multiplication and the last one with addition that increases the speed of the cryptosystem. In accordance with this, the application of the vector-modular method allows us to reduce the modular exponentiation and multiplication temporal complexity in comparison with the classical one. |
---|---|
AbstractList | This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiation with multiplication and the last one with addition that increases the speed of the cryptosystem. In accordance with this, the application of the vector-modular method allows us to reduce the modular exponentiation and multiplication temporal complexity in comparison with the classical one. |
Author | Yakymenko, Ihor Ivasiev, Stepan Basistyi, Pavlo Kasianchuk, Mykhailo Tereshchuk, Grygorii Gomotiuk, Oksana |
Author_xml | – sequence: 1 givenname: Ihor surname: Yakymenko fullname: Yakymenko, Ihor organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine – sequence: 2 givenname: Mykhailo surname: Kasianchuk fullname: Kasianchuk, Mykhailo organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine – sequence: 3 givenname: Oksana surname: Gomotiuk fullname: Gomotiuk, Oksana organization: Ternopil National Economic University,Department of document studies, information activity and Ukrainian studies,Ternopil,Ukraine – sequence: 4 givenname: Grygorii surname: Tereshchuk fullname: Tereshchuk, Grygorii organization: Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of technological education and labor protection,Ternopil,Ukraine – sequence: 5 givenname: Stepan surname: Ivasiev fullname: Ivasiev, Stepan organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine – sequence: 6 givenname: Pavlo surname: Basistyi fullname: Basistyi, Pavlo organization: Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of physics,Ternopil,Ukraine |
BookMark | eNotjs1OwzAQhI0EB1p4AiTkF0ixN3FsH1EVfqRKHCjnahNvWkt2HKUuom9PKT2NZj7NaGbsekgDMfYoxUJKYZ_Wy89mXVkJsAABYgGlUhqu2ExqMFKpula3LDZhixED76bjmBOGbZp83kWeBp53xFvc-z1P_dl8U5fTVMTkDoF4pLxL7o-dA5w4_YynC0P2mP2pj4Pj8RCyH4PvztEdu-kx7On-onP29dKsl2_F6uP1ffm8KjyIMhddha6S1ILVpuqcUs7aTtQKsFVSnpBFY0mCIYPQg1RatQqg74XDkrQu5-zhf9cT0WacfMTpuLHCGC3r8hd5EVi7 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/TCSET49122.2020.235572 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1728155665 9781728155661 |
EndPage | 929 |
ExternalDocumentID | 9088716 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-c4ad41eb29784cd55d99c0652ab511d419a89e128e8a2f21575b522ff0da3e773 |
IEDL.DBID | RIE |
IngestDate | Wed Jul 30 06:11:45 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-c4ad41eb29784cd55d99c0652ab511d419a89e128e8a2f21575b522ff0da3e773 |
PageCount | 4 |
ParticipantIDs | ieee_primary_9088716 |
PublicationCentury | 2000 |
PublicationDate | 2020-Feb. |
PublicationDateYYYYMMDD | 2020-02-01 |
PublicationDate_xml | – month: 02 year: 2020 text: 2020-Feb. |
PublicationDecade | 2020 |
PublicationTitle | 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) |
PublicationTitleAbbrev | TCSET |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7307266 |
Snippet | This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 926 |
SubjectTerms | Complexity theory Data processing Decoding ElGamal cryptosystem Encryption exponentiation multiplication Public key Reliability Telecommunications temporal complexity vector-modular method Virtual machine monitors |
Title | Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication |
URI | https://ieeexplore.ieee.org/document/9088716 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTkyAWsRbHhhJm6TOw3PVqkIqQqKVulUXP0pFHlWbIMGv5-yEghADW2wPtnzD953zfXeE3GGyZqq0u8jcpHKYjLnDhYqdBOGBcREGvjDm5NljOF2wh2WwbJH7gxdGKWXFZ6pvPu2_fFmIyjyVDYwmB_l9m7SjiNdercb067l8MB89j-eMe77xV_lG4hwEpvDvj64pFjQmx2T2tV2tFXntV2XSFx-_KjH-9zwnpPdtz6NPB-A5JS2Vd0k2TteQQUrF7n1bFpCuC8z7XzJa5BRJHkW42uxpoe3gzb7VO1khq1TRuou0WbMTsKN4mCI3OiIbNwq5pI3ysHni65HFZDwfTZ2ml4Kz8d1h6QgGknkYGcwamZBBIDkXSD98SJBy4RKHmCsEKxWDr5EHREGC1ExrV8JQRdHwjHRy3PmcUFcDAIZXeqFkKsSUSWjwk1AjNeQJyAvSNVe12tblMlbNLV3-PX1Fjky0aiH0NemUu0rdIM6Xya0N8CesRKzh |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cBI2iS1k3iuWhVoKyRSqVvl2E6pyEdVEiT49ZydUBBiYIvtwZZveO-c9-4QuoFkTVdpt4G5SWURGTCLCRVYEcADYcKjrtDm5MnUG83I_ZzOG-h264VRShnxmeroT_MvX-ai1E9lXa3JAX6_g3YpZBV-5daqbb-Ozbph_2kQEua42mHlapEzpbr074--KQY2hgdo8rVhpRZ56ZRF1BEfv2ox_vdEh6j9bdDDj1voOUINlbVQOkiWPOUJFpv3dZHzZJlD5v-c4jzDQPMwANbqFeexGbyZ13orzWWZKFz1kdZrZoJvMBwmz7SSyEQO80ziWntYP_K10Ww4CPsjq-6mYK1cu1dYgnBJHIgN5I1ESEolYwIIiMsjIF2wxHjAFMCVCrgbAxPwaQTkLI5tyXvK93vHqJnBzicI2zHnHAIsHU8S5UHSJGLuRl4M5JBFXJ6ilr6qxboqmLGob-ns7-lrtDcKJ-PF-G76cI72deQqWfQFahabUl0C6hfRlQn2J-sCsDI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+15th+International+Conference+on+Advanced+Trends+in+Radioelectronics%2C+Telecommunications+and+Computer+Engineering+%28TCSET%29&rft.atitle=Elgamal+cryptoalgorithm+on+the+basis+of+the+vector-module+method+of+modular+exponentiation+and+multiplication&rft.au=Yakymenko%2C+Ihor&rft.au=Kasianchuk%2C+Mykhailo&rft.au=Gomotiuk%2C+Oksana&rft.au=Tereshchuk%2C+Grygorii&rft.date=2020-02-01&rft.pub=IEEE&rft.spage=926&rft.epage=929&rft_id=info:doi/10.1109%2FTCSET49122.2020.235572&rft.externalDocID=9088716 |