International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 51 - Number 22 |
Year of Publication: 2012 |
Authors: A. Naresh Reddy, Rakesh Nayak, S. Baboo |
10.5120/8340-1561 |
A. Naresh Reddy, Rakesh Nayak, S. Baboo . Analysis and Performance Characteristics of Cryptosystem using Image Files. International Journal of Computer Applications. 51, 22 ( August 2012), 7-11. DOI=10.5120/8340-1561
In order to achieve the security for the e-business application, generally the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The RSA and NTRU belong to the category of asymmetric key cryptosystem. RSA is one of the oldest and the most widely used public key cryptographic algorithms. It was the first algorithm known to be suitable for signing as well as encryption. The system works on two large prime numbers, from which the public and private keys will be generated. NTRU (Nth degree truncated Polynomial ring) is a collection of mathematical algorithms based on manipulating lists of very small Integers. NTRU is the first secure public key cryptosystem. The keys are generated by having small potent polynomials from the ring of truncated polynomials. Finally we proceed with the key generation, encryption and decryption of the image required by implementing the algorithms of the asymmetric key cryptosystems. This paper presents the comparative study of RSA and NTRU algorithms for images as input and the results were observed, analyzed and compared so as to identify which method is appropriate to the business needs.