http://www.iaeme.com/IJECET/index.asp 75 editor@iaeme.com
International Journal of Electronics and Communication Engineering and Technology
(IJECET)
Volume 8, Issue 3, May-June2017, pp. 75–83, Article ID: IJECET_08_03_009
Available online at
http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=8&IType=3
ISSN Print: 0976-6464 and ISSN Online: 0976-6472
© IAEME Publication
AN APPROACH TO IMPROVE THE
COMPLEXITY OF EL-GAMAL
CRYPTOGRAPHIC ALGORITHM AND ITS
SIMULATION
Shailendra Singh Gaur
Assistant Professor, Department of I.T.,
Bhagwan Parshuram Institute of Technology, Delhi, India
Dr. A.K. Mohapatra
Associate Professor, Department of I.T.,
Indira Gandhi Delhi Technical University for Women, Delhi, India
Rashmi Roges
Assistant Professor, Department of ECE,
Bhagwan Parshuram Institute of Technology, Delhi, India
ABSTRACT
In this paper, we analyzed the principle and techniques of EL-Gamal and based
Threshold Cryptography using GMP tool. A novel approach is proposed to provide
the efficient performance and security. Using GMP tool, the data can be encrypted
and decrypted based upon the security and complexity of cryptographic algorithm.
This paper proposes on the scheme based on El-Gamal based Threshold algorithms
and their simulation results proves the efficiency and security of the network. The
result shows that the authentication and security given by El-Gamal algorithm is
enhanced by its integration of threshold cryptographic schemes.
Keywords: Cryptography, ECC, El-Gamal, GMP tool, Threshold Cryptography.
Cite this Article: Shailendra Singh Gaur, Dr. A.K. Mohapatra and Rashmi Roges, An
Approach to Improve the Complexity of EL-Gamal Cryptographic Algorithm and its
Simulation, International Journal of Electronics and Communication Engineering and
Technology, 8(3), 2017, pp. 75–83.
http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=8&IType=3
1. INTRODUCTION
Issues in relation of network security have largely been addressed as the topmost priority
whenever the installation of any network is completed. The optimal functional capabilities of
network are enhanced by the employment of a security system which includes cryptographic
characteristics. Elliptic Curve Cryptography (ECC) and El-Gamal cryptosystem are the most