Why this Encryption Method Could Outpace Today’s Standards

Written by escholar | Published 2025/09/10
Tech Story Tags: lightweight-cryptography | cryptography | post-quantum-cryptography | public-key-encryption | elliptic-curve-cryptography | isogeny-based-cryptography | internet-of-things-security | rsa-oaep-vulnerabilities

TLDRThis article demonstrates the correctness of a new cryptographic schema and presents a preliminary performance comparison against well-known systems, including RSA, ECDH, SIDH, and Kyber. Implemented in Java without optimizations, the results show that while RSA and elliptic-curve methods demand significant computing resources, the proposed schema balances security and performance, outperforming some standards. Only the highly optimized Kyber implementation proves faster, though it requires larger keys.via the TL;DR App

Table of Links

Abstract and 1 Introduction

  1. Scenario and Requirements

  2. History and Related Work

  3. Concept of Cramer-Shoup with Elliptic Curve and 4.1 Prerequisite

    4.2 Public Key Generation by Receiver

    4.3 Encryption by Sender

    4.4 Decryption by Receiver

  4. Evaluation and 5.1 Proof of Correctness

    5.2 Preliminary Performance Comparison

  5. Proof: Secure against adaptive-chosen ciphertext attacks

    6.1 DDH Assumption and 6.2 CCA Assumption

    6.3 IND-CCA 1 - non-adaptive Security

    6.4 IND-CCA 2 - adaptive Security (Validity Checking Failure)

  6. Security discussion: Post-Quantum Cryptography

  7. Summary, References, and Authors

5 Evaluation

In the following, the correct operation of the approach is first demonstrated. The subsequent performance comparison puts our approach in relation to comparable systems.

5.1 Proof of Correctness

For a better comprehensibility and compact notation, the description is done without the continuous specification of the elliptic curve F(x). The correctness of our system is given by:

So, our system is working properly.

5.2 Preliminary Performance Comparison

The implementation of our schema is done from an academic perspective in Java without any special optimizations. It serves to verify and validate the correct functioning. The performance of the algorithms is highly dependent on proper implementation and mathematical realization. The Table 1 shows a preliminary comparison of the speeds of different encryption algorithms on an Intel Core i7-8565U CPU 1.80GHz. We used freely available sources as reference implementation for RSA with Chinese-Reminder-Theorem[1], ECDH[2], SIDH[3], and Kyber[4]. The time is measured in milliseconds.

The ECDH and SIDH [54] method require more computing power than our approach and the key cannot be reused. The speed of RSA depends heavily on the key size, especially the key generation. However, RSA requires further power through OAEP and key validation, which is not included here. The more complex basis of our schema requires correspondingly more computing power to guarantee the desired security. Only the optimized implementation of Kyber for the NIST competition is faster, requiring larger keys [5].

Author:

(1) Peter Hillmann, University of the Bundeswehr Munich, Department of Computer Science, Werner-Heisenberg-Weg 39, 85577 Neubiberg, Germany.


This paper is available on arxiv under ATTRIBUTION-NONCOMMERCIAL-SHAREALIKE 4.0 INTERNATIONAL license.


[1] https://github.com/YYZ/RSA

[2] http://www.academicpub.org/PaperInfo.aspx?PaperID=14496

[3] https://github.com/Art3misOne/sidh

[4] https://github.com/fisherstevenk/kyberJCE

[5] https://pq-crystals.org/kyber/


Written by escholar | We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community
Published by HackerNoon on 2025/09/10