Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/4/3/21 |
id |
doaj-a73f0afcf845494e9e3919a06d522a62 |
---|---|
record_format |
Article |
spelling |
doaj-a73f0afcf845494e9e3919a06d522a622020-11-25T02:53:12ZengMDPI AGCryptography2410-387X2020-07-014212110.3390/cryptography4030021Implementation of a New Strongly-Asymmetric Algorithm and Its OptimizationKoki Jimbo0Satoshi Iriyama1Massimo Regoli2Information Science Department, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-0022, JapanInformation Science Department, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-0022, JapanDICII, Engineering Faculty Via del Politecnico Universitá di Roma Tor Vergata, 1, 00133 Roma, ItalyA new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from Bob. Then, the preparation and calculation processes are essentially asymmetric. This algorithms has several free parameters more than the usual symmetric PKA algorithms and the velocity of calculation is largely dependent on the parameters chosen; however, the performance of it has not yet been tested. The purpose of our study was to discuss efficient parameters to share the key with high speeds in SAA-5 and to optimize SAA-5 in terms of calculation speed. To find efficient parameters of SAA-5, we compared the calculation speed with Diffie–Hellman (D-H) while varying values of some parameters under the circumstance where the length of the secret shared key (SSK) was fixed. For optimization, we discuss a more general framework of SAA-5 to find more efficient operations. By fixing the parameters of the framework properly, a new PKA algorithm with the same security level as SAA-5 was produced. The result shows that the calculation speed of the proposed PKA algorithm is faster than D-H, especially for large key lengths. The calculation speed of the proposed PKA algorithm increases linearly as the SSK length increases, whereas D-H increases exponentially.https://www.mdpi.com/2410-387X/4/3/21public key exchangesecurityasymmetricasymmetric algorithmcryptographyframework |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Koki Jimbo Satoshi Iriyama Massimo Regoli |
spellingShingle |
Koki Jimbo Satoshi Iriyama Massimo Regoli Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization Cryptography public key exchange security asymmetric asymmetric algorithm cryptography framework |
author_facet |
Koki Jimbo Satoshi Iriyama Massimo Regoli |
author_sort |
Koki Jimbo |
title |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization |
title_short |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization |
title_full |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization |
title_fullStr |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization |
title_full_unstemmed |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization |
title_sort |
implementation of a new strongly-asymmetric algorithm and its optimization |
publisher |
MDPI AG |
series |
Cryptography |
issn |
2410-387X |
publishDate |
2020-07-01 |
description |
A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from Bob. Then, the preparation and calculation processes are essentially asymmetric. This algorithms has several free parameters more than the usual symmetric PKA algorithms and the velocity of calculation is largely dependent on the parameters chosen; however, the performance of it has not yet been tested. The purpose of our study was to discuss efficient parameters to share the key with high speeds in SAA-5 and to optimize SAA-5 in terms of calculation speed. To find efficient parameters of SAA-5, we compared the calculation speed with Diffie–Hellman (D-H) while varying values of some parameters under the circumstance where the length of the secret shared key (SSK) was fixed. For optimization, we discuss a more general framework of SAA-5 to find more efficient operations. By fixing the parameters of the framework properly, a new PKA algorithm with the same security level as SAA-5 was produced. The result shows that the calculation speed of the proposed PKA algorithm is faster than D-H, especially for large key lengths. The calculation speed of the proposed PKA algorithm increases linearly as the SSK length increases, whereas D-H increases exponentially. |
topic |
public key exchange security asymmetric asymmetric algorithm cryptography framework |
url |
https://www.mdpi.com/2410-387X/4/3/21 |
work_keys_str_mv |
AT kokijimbo implementationofanewstronglyasymmetricalgorithmanditsoptimization AT satoshiiriyama implementationofanewstronglyasymmetricalgorithmanditsoptimization AT massimoregoli implementationofanewstronglyasymmetricalgorithmanditsoptimization |
_version_ |
1724726126811545600 |