Abstract
This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure routerto- router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution,which will be compared in this paper to RSA,AES, and ECC encryption algorithms. RSA certificates arewidely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security.This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.
Cite
CITATION STYLE
Parmar, N. J., & Verma, P. K. (2017). A comparative evaluation of algorithms in the implementation of an ultra-secure router-to-router key exchange system. Security and Communication Networks, 2017. https://doi.org/10.1155/2017/1467614
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.