A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

Joint Authors

Verma, Pramode K.
Parmar, Nishaal J.

Source

Security and Communication Networks

Issue

Vol. 2017, Issue 2017 (31 Dec. 2017), pp.1-7, 7 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2017-01-12

Country of Publication

Egypt

No. of Pages

7

Main Subjects

Information Technology and Computer Science

Abstract EN

This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma.

The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms.

RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture.

AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security.

This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.

American Psychological Association (APA)

Parmar, Nishaal J.& Verma, Pramode K.. 2017. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks،Vol. 2017, no. 2017, pp.1-7.
https://search.emarefa.net/detail/BIM-1202748

Modern Language Association (MLA)

Parmar, Nishaal J.& Verma, Pramode K.. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks No. 2017 (2017), pp.1-7.
https://search.emarefa.net/detail/BIM-1202748

American Medical Association (AMA)

Parmar, Nishaal J.& Verma, Pramode K.. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks. 2017. Vol. 2017, no. 2017, pp.1-7.
https://search.emarefa.net/detail/BIM-1202748

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1202748