I. Putu Agus Eka Pratama, I. Gusti Ngurah Agung Krisna Adhitya
{"title":"Post Quantum Cryptography: Comparison between RSA and McEliece","authors":"I. Putu Agus Eka Pratama, I. Gusti Ngurah Agung Krisna Adhitya","doi":"10.1109/ICISS55894.2022.9915232","DOIUrl":null,"url":null,"abstract":"Cryptography is one of the techniques used to secure the process of communication in the presence of an adversarial party. Public key cryptosystem allows the process of encryption and decryption to use two different keys. The current de-facto algorithm for public key cryptosystem is the RSA. However, this cryptosystem is now considered insecure in the presence of quantum computing. The insecurity of this cryptosystem comes from an algorithm that can efficiently solve the Integer Factorization Problem, which has been the strength of RSA cryptosystem. Shor's algorithm can factor composite integers into its prime factors using a quantum computer in polynomial time. This research will give an insight on an alternative public key cryptosystem that is quantum resistant. The result of this research shows that while the RSA has better average time than the McEliece cryptosystem, McEliece cryptosystem has better cryptographic strength when compared to RSA.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on ICT for Smart Society (ICISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISS55894.2022.9915232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptography is one of the techniques used to secure the process of communication in the presence of an adversarial party. Public key cryptosystem allows the process of encryption and decryption to use two different keys. The current de-facto algorithm for public key cryptosystem is the RSA. However, this cryptosystem is now considered insecure in the presence of quantum computing. The insecurity of this cryptosystem comes from an algorithm that can efficiently solve the Integer Factorization Problem, which has been the strength of RSA cryptosystem. Shor's algorithm can factor composite integers into its prime factors using a quantum computer in polynomial time. This research will give an insight on an alternative public key cryptosystem that is quantum resistant. The result of this research shows that while the RSA has better average time than the McEliece cryptosystem, McEliece cryptosystem has better cryptographic strength when compared to RSA.