http://www.iaeme.com/IJECET/index.asp 75 editor@iaeme.com International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 3, May-June2017, pp. 75–83, Article ID: IJECET_08_03_009 Available online at http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=8&IType=3 ISSN Print: 0976-6464 and ISSN Online: 0976-6472 © IAEME Publication AN APPROACH TO IMPROVE THE COMPLEXITY OF EL-GAMAL CRYPTOGRAPHIC ALGORITHM AND ITS SIMULATION Shailendra Singh Gaur Assistant Professor, Department of I.T., Bhagwan Parshuram Institute of Technology, Delhi, India Dr. A.K. Mohapatra Associate Professor, Department of I.T., Indira Gandhi Delhi Technical University for Women, Delhi, India Rashmi Roges Assistant Professor, Department of ECE, Bhagwan Parshuram Institute of Technology, Delhi, India ABSTRACT In this paper, we analyzed the principle and techniques of EL-Gamal and based Threshold Cryptography using GMP tool. A novel approach is proposed to provide the efficient performance and security. Using GMP tool, the data can be encrypted and decrypted based upon the security and complexity of cryptographic algorithm. This paper proposes on the scheme based on El-Gamal based Threshold algorithms and their simulation results proves the efficiency and security of the network. The result shows that the authentication and security given by El-Gamal algorithm is enhanced by its integration of threshold cryptographic schemes. Keywords: Cryptography, ECC, El-Gamal, GMP tool, Threshold Cryptography. Cite this Article: Shailendra Singh Gaur, Dr. A.K. Mohapatra and Rashmi Roges, An Approach to Improve the Complexity of EL-Gamal Cryptographic Algorithm and its Simulation, International Journal of Electronics and Communication Engineering and Technology, 8(3), 2017, pp. 75–83. http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=8&IType=3 1. INTRODUCTION Issues in relation of network security have largely been addressed as the topmost priority whenever the installation of any network is completed. The optimal functional capabilities of network are enhanced by the employment of a security system which includes cryptographic characteristics. Elliptic Curve Cryptography (ECC) and El-Gamal cryptosystem are the most