Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization

A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from...

Full description

Bibliographic Details
Main Authors: Koki Jimbo, Satoshi Iriyama, Massimo Regoli
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/3/21
id doaj-a73f0afcf845494e9e3919a06d522a62
record_format Article
spelling doaj-a73f0afcf845494e9e3919a06d522a622020-11-25T02:53:12ZengMDPI AGCryptography2410-387X2020-07-014212110.3390/cryptography4030021Implementation of a New Strongly-Asymmetric Algorithm and Its OptimizationKoki Jimbo0Satoshi Iriyama1Massimo Regoli2Information Science Department, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-0022, JapanInformation Science Department, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-0022, JapanDICII, Engineering Faculty Via del Politecnico Universitá di Roma Tor Vergata, 1, 00133 Roma, ItalyA new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from Bob. Then, the preparation and calculation processes are essentially asymmetric. This algorithms has several free parameters more than the usual symmetric PKA algorithms and the velocity of calculation is largely dependent on the parameters chosen; however, the performance of it has not yet been tested. The purpose of our study was to discuss efficient parameters to share the key with high speeds in SAA-5 and to optimize SAA-5 in terms of calculation speed. To find efficient parameters of SAA-5, we compared the calculation speed with Diffie–Hellman (D-H) while varying values of some parameters under the circumstance where the length of the secret shared key (SSK) was fixed. For optimization, we discuss a more general framework of SAA-5 to find more efficient operations. By fixing the parameters of the framework properly, a new PKA algorithm with the same security level as SAA-5 was produced. The result shows that the calculation speed of the proposed PKA algorithm is faster than D-H, especially for large key lengths. The calculation speed of the proposed PKA algorithm increases linearly as the SSK length increases, whereas D-H increases exponentially.https://www.mdpi.com/2410-387X/4/3/21public key exchangesecurityasymmetricasymmetric algorithmcryptographyframework
collection DOAJ
language English
format Article
sources DOAJ
author Koki Jimbo
Satoshi Iriyama
Massimo Regoli
spellingShingle Koki Jimbo
Satoshi Iriyama
Massimo Regoli
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
Cryptography
public key exchange
security
asymmetric
asymmetric algorithm
cryptography
framework
author_facet Koki Jimbo
Satoshi Iriyama
Massimo Regoli
author_sort Koki Jimbo
title Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
title_short Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
title_full Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
title_fullStr Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
title_full_unstemmed Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
title_sort implementation of a new strongly-asymmetric algorithm and its optimization
publisher MDPI AG
series Cryptography
issn 2410-387X
publishDate 2020-07-01
description A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from Bob. Then, the preparation and calculation processes are essentially asymmetric. This algorithms has several free parameters more than the usual symmetric PKA algorithms and the velocity of calculation is largely dependent on the parameters chosen; however, the performance of it has not yet been tested. The purpose of our study was to discuss efficient parameters to share the key with high speeds in SAA-5 and to optimize SAA-5 in terms of calculation speed. To find efficient parameters of SAA-5, we compared the calculation speed with Diffie–Hellman (D-H) while varying values of some parameters under the circumstance where the length of the secret shared key (SSK) was fixed. For optimization, we discuss a more general framework of SAA-5 to find more efficient operations. By fixing the parameters of the framework properly, a new PKA algorithm with the same security level as SAA-5 was produced. The result shows that the calculation speed of the proposed PKA algorithm is faster than D-H, especially for large key lengths. The calculation speed of the proposed PKA algorithm increases linearly as the SSK length increases, whereas D-H increases exponentially.
topic public key exchange
security
asymmetric
asymmetric algorithm
cryptography
framework
url https://www.mdpi.com/2410-387X/4/3/21
work_keys_str_mv AT kokijimbo implementationofanewstronglyasymmetricalgorithmanditsoptimization
AT satoshiiriyama implementationofanewstronglyasymmetricalgorithmanditsoptimization
AT massimoregoli implementationofanewstronglyasymmetricalgorithmanditsoptimization
_version_ 1724726126811545600