![](/images/graphics-bg.png)
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System
Joint Authors
Verma, Pramode K.
Parmar, Nishaal J.
Source
Security and Communication Networks
Issue
Vol. 2017, Issue 2017 (31 Dec. 2017), pp.1-7, 7 p.
Publisher
Hindawi Publishing Corporation
Publication Date
2017-01-12
Country of Publication
Egypt
No. of Pages
7
Main Subjects
Information Technology and Computer Science
Abstract EN
This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma.
The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms.
RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture.
AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security.
This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.
American Psychological Association (APA)
Parmar, Nishaal J.& Verma, Pramode K.. 2017. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks،Vol. 2017, no. 2017, pp.1-7.
https://search.emarefa.net/detail/BIM-1202748
Modern Language Association (MLA)
Parmar, Nishaal J.& Verma, Pramode K.. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks No. 2017 (2017), pp.1-7.
https://search.emarefa.net/detail/BIM-1202748
American Medical Association (AMA)
Parmar, Nishaal J.& Verma, Pramode K.. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks. 2017. Vol. 2017, no. 2017, pp.1-7.
https://search.emarefa.net/detail/BIM-1202748
Data Type
Journal Articles
Language
English
Notes
Includes bibliographical references
Record ID
BIM-1202748