Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication

This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiat...

Full description

Saved in:
Bibliographic Details
Published in2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) pp. 926 - 929
Main Authors Yakymenko, Ihor, Kasianchuk, Mykhailo, Gomotiuk, Oksana, Tereshchuk, Grygorii, Ivasiev, Stepan, Basistyi, Pavlo
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2020
Subjects
Online AccessGet full text
DOI10.1109/TCSET49122.2020.235572

Cover

Abstract This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiation with multiplication and the last one with addition that increases the speed of the cryptosystem. In accordance with this, the application of the vector-modular method allows us to reduce the modular exponentiation and multiplication temporal complexity in comparison with the classical one.
AbstractList This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the vector-modular method of modular exponentiation and multiplication. This allows us to replace the complex operation of the modular exponentiation with multiplication and the last one with addition that increases the speed of the cryptosystem. In accordance with this, the application of the vector-modular method allows us to reduce the modular exponentiation and multiplication temporal complexity in comparison with the classical one.
Author Yakymenko, Ihor
Ivasiev, Stepan
Basistyi, Pavlo
Kasianchuk, Mykhailo
Tereshchuk, Grygorii
Gomotiuk, Oksana
Author_xml – sequence: 1
  givenname: Ihor
  surname: Yakymenko
  fullname: Yakymenko, Ihor
  organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine
– sequence: 2
  givenname: Mykhailo
  surname: Kasianchuk
  fullname: Kasianchuk, Mykhailo
  organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine
– sequence: 3
  givenname: Oksana
  surname: Gomotiuk
  fullname: Gomotiuk, Oksana
  organization: Ternopil National Economic University,Department of document studies, information activity and Ukrainian studies,Ternopil,Ukraine
– sequence: 4
  givenname: Grygorii
  surname: Tereshchuk
  fullname: Tereshchuk, Grygorii
  organization: Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of technological education and labor protection,Ternopil,Ukraine
– sequence: 5
  givenname: Stepan
  surname: Ivasiev
  fullname: Ivasiev, Stepan
  organization: Ternopil National Economic University,Department of cybersecurity,Ternopil,Ukraine
– sequence: 6
  givenname: Pavlo
  surname: Basistyi
  fullname: Basistyi, Pavlo
  organization: Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of physics,Ternopil,Ukraine
BookMark eNotjs1OwzAQhI0EB1p4AiTkF0ixN3FsH1EVfqRKHCjnahNvWkt2HKUuom9PKT2NZj7NaGbsekgDMfYoxUJKYZ_Wy89mXVkJsAABYgGlUhqu2ExqMFKpula3LDZhixED76bjmBOGbZp83kWeBp53xFvc-z1P_dl8U5fTVMTkDoF4pLxL7o-dA5w4_YynC0P2mP2pj4Pj8RCyH4PvztEdu-kx7On-onP29dKsl2_F6uP1ffm8KjyIMhddha6S1ILVpuqcUs7aTtQKsFVSnpBFY0mCIYPQg1RatQqg74XDkrQu5-zhf9cT0WacfMTpuLHCGC3r8hd5EVi7
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/TCSET49122.2020.235572
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728155665
9781728155661
EndPage 929
ExternalDocumentID 9088716
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-c4ad41eb29784cd55d99c0652ab511d419a89e128e8a2f21575b522ff0da3e773
IEDL.DBID RIE
IngestDate Wed Jul 30 06:11:45 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-c4ad41eb29784cd55d99c0652ab511d419a89e128e8a2f21575b522ff0da3e773
PageCount 4
ParticipantIDs ieee_primary_9088716
PublicationCentury 2000
PublicationDate 2020-Feb.
PublicationDateYYYYMMDD 2020-02-01
PublicationDate_xml – month: 02
  year: 2020
  text: 2020-Feb.
PublicationDecade 2020
PublicationTitle 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)
PublicationTitleAbbrev TCSET
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7307266
Snippet This paper presents the implementation of the ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on the application of the...
SourceID ieee
SourceType Publisher
StartPage 926
SubjectTerms Complexity theory
Data processing
Decoding
ElGamal cryptosystem
Encryption
exponentiation
multiplication
Public key
Reliability
Telecommunications
temporal complexity
vector-modular method
Virtual machine monitors
Title Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
URI https://ieeexplore.ieee.org/document/9088716
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTkyAWsRbHhhJm6TOw3PVqkIqQqKVulUXP0pFHlWbIMGv5-yEghADW2wPtnzD953zfXeE3GGyZqq0u8jcpHKYjLnDhYqdBOGBcREGvjDm5NljOF2wh2WwbJH7gxdGKWXFZ6pvPu2_fFmIyjyVDYwmB_l9m7SjiNdercb067l8MB89j-eMe77xV_lG4hwEpvDvj64pFjQmx2T2tV2tFXntV2XSFx-_KjH-9zwnpPdtz6NPB-A5JS2Vd0k2TteQQUrF7n1bFpCuC8z7XzJa5BRJHkW42uxpoe3gzb7VO1khq1TRuou0WbMTsKN4mCI3OiIbNwq5pI3ysHni65HFZDwfTZ2ml4Kz8d1h6QgGknkYGcwamZBBIDkXSD98SJBy4RKHmCsEKxWDr5EHREGC1ExrV8JQRdHwjHRy3PmcUFcDAIZXeqFkKsSUSWjwk1AjNeQJyAvSNVe12tblMlbNLV3-PX1Fjky0aiH0NemUu0rdIM6Xya0N8CesRKzh
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cBI2iS1k3iuWhVoKyRSqVvl2E6pyEdVEiT49ZydUBBiYIvtwZZveO-c9-4QuoFkTVdpt4G5SWURGTCLCRVYEcADYcKjrtDm5MnUG83I_ZzOG-h264VRShnxmeroT_MvX-ai1E9lXa3JAX6_g3YpZBV-5daqbb-Ozbph_2kQEua42mHlapEzpbr074--KQY2hgdo8rVhpRZ56ZRF1BEfv2ox_vdEh6j9bdDDj1voOUINlbVQOkiWPOUJFpv3dZHzZJlD5v-c4jzDQPMwANbqFeexGbyZ13orzWWZKFz1kdZrZoJvMBwmz7SSyEQO80ziWntYP_K10Ww4CPsjq-6mYK1cu1dYgnBJHIgN5I1ESEolYwIIiMsjIF2wxHjAFMCVCrgbAxPwaQTkLI5tyXvK93vHqJnBzicI2zHnHAIsHU8S5UHSJGLuRl4M5JBFXJ6ilr6qxboqmLGob-ns7-lrtDcKJ-PF-G76cI72deQqWfQFahabUl0C6hfRlQn2J-sCsDI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+15th+International+Conference+on+Advanced+Trends+in+Radioelectronics%2C+Telecommunications+and+Computer+Engineering+%28TCSET%29&rft.atitle=Elgamal+cryptoalgorithm+on+the+basis+of+the+vector-module+method+of+modular+exponentiation+and+multiplication&rft.au=Yakymenko%2C+Ihor&rft.au=Kasianchuk%2C+Mykhailo&rft.au=Gomotiuk%2C+Oksana&rft.au=Tereshchuk%2C+Grygorii&rft.date=2020-02-01&rft.pub=IEEE&rft.spage=926&rft.epage=929&rft_id=info:doi/10.1109%2FTCSET49122.2020.235572&rft.externalDocID=9088716