dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
El-Kassar, A. N. |
|
dc.contributor.author |
Otrok, Hadi |
|
dc.date.accessioned |
2017-06-29T10:40:57Z |
|
dc.date.available |
2017-06-29T10:40:57Z |
|
dc.date.copyright |
2004 |
en_US |
dc.date.issued |
2017-06-29 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/5850 |
en_US |
dc.description.abstract |
In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key encryption scheme from the domain of natural integers, Z, to two principal ideal domains, namely the domain of Gaussian integers, Z[ i ], and the domain of the rings of polynomials over finite fields, F[x], by extending the arithmetic needed for the modifications to these domains. In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. We enhance the Baby-Step-Giant algorithm to work with the modified ElGamal cryptosystems. |
en_US |
dc.description.sponsorship |
IBM |
en_US |
dc.description.sponsorship |
I2S |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
INSTICC |
en_US |
dc.title |
A Comparative Study of Elgamal Based Cryptographic Algorithms |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SOB |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199529190 |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Department of Information Technology and Operations Management (ITOM) |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.keywords |
ElGamal cryptosystem |
en_US |
dc.keywords |
Testing and evaluation |
en_US |
dc.identifier.ctation |
Haraty, R. A., Otrok, H., & El-Kassar, A. N. (2004, April). A Comparative Study of Elgamal Based Cryptographic Algorithms. In ICEIS (3) (pp. 79-84). |
en_US |
dc.author.email |
abdulnasser.kassar@lau.edu.lb |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.conference.date |
14-17, April 2004 |
en_US |
dc.conference.pages |
79-84 |
en_US |
dc.conference.place |
Universidade Portucalense, Porto - Portugal |
en_US |
dc.conference.title |
6th International Conference on Enterprise Information Systems |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://www.iceis.org/iceis2004/ |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-8423-8723 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |