- 1Department of Mathematics, GIET University, Gunupur, Odisha, India
- 2School of Computer Sciences, OUTR, Bhubaneswar, Odisha, India
This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. The encryption process is modeled using graph structures such as the Star graph, along with other well-known algorithms like A*, Dijkstra, Bellman-Ford, and Floyd-Warshall for comparative analysis and performance benchmarking. Consequently, this research conducts a comparative analysis of RSA and ElGamal cryptographic algorithms by applying them to mixed data, including binary, text, and image files. The CPU's internal clock was employed to record the execution time of encryption and decryption operations, facilitating the assessment of time complexity for both algorithms. The CPU's internal memory was employed to monitor and record memory usage during the encryption and decryption operations performed on mixed datasets. Accordingly, the evaluation of the encryption algorithms was conducted using criteria such as encryption time, decryption time, and throughput to determine their relative performance. In evaluating cryptographic approaches, factors such as response time, confidentiality, bandwidth, and integrity are considered. Experimental results indicate that RSA demonstrates superior time efficiency and resource utilization, whereas the ElGamal algorithm exhibits greater memory efficiency and resourcefulness. This study evaluates RSA and ElGamal encryption on text, image, audio, and data files of varying sizes using graph-based models. The Star graph algorithm is adopted for its simplicity and low computational cost, and its performance is compared against A*, Dijkstra, and Bellman-Ford algorithms. Results show that the Star model offers near-optimal paths with significantly reduced processing time, demonstrating high confidence in efficiency for lightweight encryption tasks. We have added computational performance, logical confidence, and optimality conditions of the proposed Star-based encryption model. The Star algorithm, integrated with RSA/ElGamal encryption, is benchmarked against classical pathfinding algorithms like A*, Dijkstra, and Bellman-Ford, commonly used for routing and shortest-path computations. Computational performance of (i) the worst-case time complexity of star algorithm (proposed) is O(bd) where b is the branching factor and d is the depth and space complexity is O(E + V) where E is the number of edges and V is the number of nodes, high (central node access) traversal efficiency, excellent (centralized graph encoding) suitability for graph-based encryption, very high structural simplicity, (ii) the worst case time complexity of A* Algorithm is O(bd) where b is the branching factor and d is the depth and space complexity is O(E + V) where E is the number of edges and V is the number of nodes, high (with good heuristic) traversal efficiency, good (needs proper graph abstraction) suitability for graph-based encryption, moderate structural simplicity, (iii) the average case time complexity and best case time complexity of Dijkstra's Algorithm is O((V + E) log V) and the worst case time complexity is O((V2) logV) and space complexity is O(V) where V is the number of vertices, moderate to high traversal efficiency, fair (efficient in weighted graphs) suitability for graph-based encryption, moderate structural simplicity, and (iv) Bellman-Ford Algorithm is O(V*E) time complexity and O(V) space complexity where V is the number of vertices and E is the number of edges, low traversal efficiency, limited (computationally expensive) suitability for graph-based encryption, moderate structural simplicity.
1 Introduction
Data security involves implementing strategies to safeguard digital information against unauthorized disclosure and modification across computing and communication infrastructures. Given the exponential growth in data communication and transfer volumes, coupled with the escalating frequency and sophistication of cyber threats, ensuring robust data security has become more critical than ever. This urgency is underscored by the increasing number of data breaches and cyberattacks targeting sensitive information across various sectors (Li et al., 2022). Consequently, research in data security has rapidly advanced, leading to significant developments in related fields such as cryptography. These advancements have resulted in the creation of sophisticated encryption techniques, including quantum-resistant algorithms and homomorphic encryption, which enhance the protection of sensitive information across various applications. Cryptography is the practice of securing information by converting readable data (plaintext) into an unreadable format (ciphertext) through encryption, and then reverting it back to its original form via decryption. This process ensures that only authorized parties can access the original information (Adeniyi et al., 2022). Cryptography is the discipline dedicated to safeguarding information by transforming it into an unreadable format for unauthorized individuals during storage and transmission. This process, known as encryption, converts plaintext into ciphertext, ensuring that only authorized parties can revert it back to its original form through decryption. By employing mathematical techniques, cryptography ensures data confidentiality, integrity, and authenticity, making it a fundamental component of modern information security systems (Panda and Nag, 2015). Plaintext, also known as clear text, refers to data in its original, readable form that has not been encrypted. It serves as the fundamental input for encryption processes, where it is transformed into ciphertext to protect its confidentiality. Understanding and managing plaintext is crucial in information security, as it pertains to ensuring data confidentiality, integrity, and authentication (Singh et al., 2022).
Our focus is on evaluating the performance of algorithm through the utilization of graph theory and algebraic concepts (West, 2001). In graph theory, a star graph is a type of tree graph characterized by a central node connected directly to all other nodes, which are known as leaves. This structure is a specific case of a complete bipartite graph, denoted as K1, n where “1” represents the central node and “n” denotes the number of leaf nodes. The star graph Sn+1 on n+1 vertices can be represented as the corona product K1⊙¯Kn where K1 is a complete graph on one vertex, and Kn is a complete graph on n vertices. Similarly, the corona graph of a cycle Cn with K1, denoted as Cn⊙K1 is a graph on 2n vertices obtained by attaching n pendant edges to the cycle Cn. Each vertex of the cycle is connected to a new pendant vertex, enhancing the cycle's connectivity.
Several recent studies have focused on evaluating the performance of RSA and ElGamal cryptographic algorithms, particularly concerning their time and space complexities when applied to mixed data. This section provides a comprehensive summary of these studies, analyzing the methodologies employed and their relevance to the current research. The authors conducted a comparative analysis of RSA and ElGamal cryptographic algorithms, focusing on their energy efficiency and impact on network longevity.
The remainder of this paper is organized as follows. Section 2 presents an overview of the background of the proposed work including a survey of already published techniques regarding their security concerns. Section 3 elaborates the proposed framework of algorithm. We then discuss the implementation of the proposed work with result in Section 4. Discussion presented in Section 5 and finally, Section 6 concludes the paper along with future scope.
2 Related work
Kayalvizhi et al. (2010), utilizing a cluster-based wireless sensor network topology within the NS2 simulation environment, they assessed how each algorithm influences power consumption and overall network lifespan. The study revealed that RSA tends to consume 14.5% less power compared to ElGamal, thereby potentially extending the operational duration was limited to 10 sensor nodes of the wireless sensor networks. Researchers have implemented various cryptographic algorithms in Java to enhance cloud data security, focusing on both symmetric techniques (AES, DES, and Blowfish) and asymmetric methods (RSA). Performance evaluations revealed that Blowfish demonstrated the fastest processing time, followed by AES and DES, with RSA being the slowest. In terms of memory usage, Blowfish, AES, and 3DES consumed similar amounts, whereas RSA utilized approximately twice as much memory as the symmetric algorithms. These findings suggest that Blowfish offers superior speed and efficient memory usage, making it suitable for applications where performance is critical. AES provides a balance between speed and security, while RSA, despite its higher resource consumption, remains valuable for scenarios requiring robust asymmetric encryption (Arora et al., 2013). In Boni et al. (2015), the authors proposed an innovative approach to enhance the Diffie-Hellman key exchange algorithm by introducing the Multiplicative Key Exchange (MKE) technique. This method simplifies the key generation process, reducing computational complexity. Their findings indicate that MKE outperforms the traditional Diffie-Hellman algorithm in terms of execution time, requiring fewer computations. This approach is particularly beneficial in scenarios where rapid key generation is essential, such as in less complex systems with minimal setup requirements. In their study, the authors analyzed the performance of RSA and ElGamal algorithms concerning computing speeds for securing, ensuring confidentiality, and authenticating text data. They employed the computer's internal clock to measure and compare the execution times of both algorithms across various text data inputs, aiming to determine which method is more computationally effective. The implementation was tested using text files of different sizes. The results indicated that RSA is more computationally efficient than ElGamal, leading to better performance. However, a limitation of this research is the use of text data with limited character sizes (Okeyinka, 2015). In another study, the authors evaluated the performance of LUC, ElGamal, and RSA algorithms in text encryption. Each algorithm was implemented across various text samples to measure encryption and decryption times. The findings indicated that RSA exhibited superior performance in encryption speed, while LUC demonstrated enhanced efficiency during decryption. The scope of the study was confined to encrypting secret messages in textual format (Sari et al., 2020). Ni et al. (2021) collaboratively developed novel encryption algorithms utilizing specific graph structures, notably corona graphs and bipartite graphs, to enhance secure message transmission. In Desai et al. (2022) and Behera and Gountia (2024), the authors conducted a comprehensive analysis of several asymmetric public key cryptosystems, focusing on performance-based criteria and metrics. Their research entailed an in-depth comparative examination of RSA, ElGamal, and ECC-ElGamal algorithms. The study aimed to derive clear conclusions regarding the performance requirements of these algorithms. Notably, the research highlighted that Elliptic Curve Cryptography (ECC) offers significant advantages in terms of smaller key sizes and higher computational efficiency, making it well-suited for modern devices with limited processing capabilities, such as smart cards and IoT devices. In Parenreng and Wahid (2022), the study proposed a hybrid cryptographic approach that utilizes the ElGamal encryption model for secure symmetric key distribution, coupled with the Advanced Encryption Standard (AES) algorithm for encrypting message content. This combination leverages the strengths of both asymmetric and symmetric encryption techniques to enhance email security. The implementation was integrated into an email system, effectively encrypting messages and data transmitted via email. The primary objective was to address prevalent email security challenges, particularly the risk of data leakage during email transmission. In this research article (Ali et al., 2024), the authors collectively developed novel encryption algorithms utilizing specific graph structures—namely corona graphs, star graphs, and complete bipartite graphs—to enhance secure message transmission.
3 Proposed algorithm
This study evaluates the performance of RSA and ElGamal cryptographic algorithms by measuring their encryption and decryption times, as well as memory usage on text data.
RSA Algorithm (Pseudocode):
Plaintext:
Input: Message M, Key size (k), Two large primes p and q
Output: Ciphertext C
Key Generation:
1. Choose primes p, q
2. Compute modulus: n ← p × q
3. Compute ϕ(n)← (p – 1) × (q – 1)
4. Choose public exponent e such that gcd (e, ϕ(n)) = 1
5. Compute private key
d ← e−1(mod ϕ(n))
Encryption:
6. C ← Me(mod n)
Decryption:
7. M ← Cd(mod n)
ElGamal Algorithm (Pseudocode):
Input: Message M, Prime p, Generator g, Private key x
Output: Ciphertext (C1, C2)
Key Generation:
1. Choose large prime p and generator g ϵ Zp*.
2. Select private key x ϵ [1, p-2]
3. Compute h ← gx modp
Public key = (p, g, h)
Encryption:
4. Select random k ϵ [1, p-2]
5. C1 ← gk mod p
6. C2 ← M.hk mod p
Ciphertext = (C1, C2)
Decryption:
7. s ← C1x modp
8. s−1 ← modular inverse of s mod p.
9. M ← C2 .s-1 mod p.
Dataset justification & computational considerations:
Data sources: realistic test files (text, images, and audio clips) and randomly generated structured data were used. File sizes: 22, 50, 55, 60, 90, 120, 200, 2,048, and 5,120 KB.
Execution platform: windows 10 (64-bit), Intel i7 2.23 GHz, 8 GB RAM.
Language and Mode: RSA and ElGamal implemented in C#, using CBC mode with key sizes of 64-bit and 128-bit.
Rounds: 10 rounds of encryption/decryption per block.
Measurement: CPU clock used for timing. Execution times and memory usage recorded and plotted (see Figures 1–12).

Figure 2. Analysis of memory used for RSA and ElGamal for text dataset during the encryption process.

Figure 4. Analysis of memory used for RSA and ElGamal for text data set during the decryption process.
Relevance of modulo arithmetic: modulo operations (mod n or mod p) play a critical role in ensuring bounded number systems and protecting against overflow during exponentiation. The choice of p, n, and their bit-length directly influences:
• Execution time (due to large number operations).
• Memory use (due to ciphertext expansion).
• Security strength (based on size of p/n).
Let us assume the encryption time (C1), decryption time (C2), and memory usage (C3) for a 22 KB text file using RSA and ElGamal with 128-bit keys, highlighting the impact of modulo arithmetic operations. The number of blocks (B) is estimated as 22 KB/16 bytes (CBC block size) ≈ 1,375 blocks.
RSA: each block requires one modular exponentiation c = (Memod n) for encryption and one M = (cdmod n) for decryption, with time complexity O(log2n)and O(log3n). For 1,375 blocks, C1 ≈ ,1375 * k1 * log3 (2128) ≈ 0.1082 s, where k1≈3.6 * 10-8 seconds per modular reflecting efficient implementation. Memory usage (C3) is higher due to larger buffers for n and temporary values.
ElGamal: encryption requires two modular exponentiations per block (gk mod p, yk * M mod p), doubling the computational cost, so C1 ≈ 1,375 * 2 * k4 * log3 (2128) ≈ 1.55 seconds where k4≈2.8 * 10-7 s. Decryption involves one exponentiation and one inverse, increasing C2. Lower memory usage (C3) results from optimized storage of p and ciphertexts.
In this section, while RSA key generation is a standard cryptographic step, in this study it is primarily used to support the performance evaluation of encryption and decryption processes. Therefore, detailed key generation steps are intentionally abstracted to maintain focus on time and space complexity analysis. However, for completeness, key length (64-bit and 128-bit) and their role in computational cost are considered in performance graphs. Key generation complexity can be added in future work for deeper cryptographic analysis.
Performance evaluation metrics: this study assesses the efficiency of cryptographic algorithms using the following metrics:
Encryption time: the duration required by the algorithm to encrypt text datasets. This is measured using the system's internal clock.
Decryption time: the time taken by the algorithm to decrypt text datasets, also recorded via the system's internal clock.
Encryption memory usage: the amount of system memory consumed during the encryption process of text data.
Decryption memory usage: the memory utilized during the decryption process of text data.
CPU internal clock: utilized to accurately measure the encryption and decryption times across various data categories.
CPU internal memory: employed to determine the memory consumption of both algorithms during the encryption and decryption processes for all data types.
4 Results
Example 1: consider the word “OPEN.” To encrypt this word using a specific scheme, we begin by converting each alphabetic character to its corresponding numeric value. Assuming a simple substitution where A = 1, B = 2,..., Z = 26, the conversions are as follows:
O P E N
15 16 5 14
Thus, the word “OPEN” is represented numerically as 15 16 5 14. The length of the message, denoted as K, is 4. Consider a star graph S5, which can be represented as the corona product S5=K1⊙¯K4. In this structure, the central vertex of K1 is connected to each vertex of the complete graph K4, forming a star-like configuration. This graph comprises five vertices in total, corresponding to the length of the message. As illustrated in Figures 13, 14 the edges connecting the central node to the peripheral nodes are labeled sequentially as e1, e2, e3, e4.
4.1 Application of RSA algorithm in star graph K1⊙¯Kn
Now RSA algorithm begins: select two prime numbers, p = 3 and q = 11. Calculate n = pq = 3*11 = 33. Calculate ϕ(n) = (p – 1) (q – 1) = (3 – 1) (11 – 1) = 2*10 = 20. Select e such that e is relatively prime to ϕ(n). So, we select e = 7 determine d such that
where, d is private key.
Here, Public key PU (e, n) =7, 33, Private key PR (d, n) = 3, 33.
Assign the vertex of graph as β1 = 15, β2=16, β3 = 5, β4 = 14.
Then find δi= βie(mod n).
Subtract k to each δi give γi. So, γ1 = δ1 – k, γ2 = δ2 – k, γ3 = δ3 – k, γ4 = δ4 – k.
We will get, γ1 = 23, γ2 = 21, γ3 = 10, γ4 = 16.
Convert each γi value to character letter as W = 23, U = 21, J = 10, P = 16.
So, sender send message “WUJP” to the receiver.
Receiver after getting message, convert to numeric value as 23, 21, 10, 16.
He then add length of message 4 to the numeric value. We will get, 23 + 4 = 27, 21 + 4 = 25, 10 + 4 = 14, 16 + 4 = 20. Assign the value as δi. So, δ1 = 27, δ2 = 25, δ3 = 14, δ4 = 20.
Now receiver use private key d = 3 and find αi= δdi (mod n) ). So,
α2= δd1 (mod n ) = 15,
α2= δd2 (mod n ) = 16,
α2= δd3 (mod n ) = 5,
α2= δd4 (mod n ) = 14. Convert the αi value to alphabetic character. α1 = O, α2 = P, α3 = E, α4= N.
Finally, receiver receives message “OPEN.”
4.2 Application of ElGamal algorithm in star graphs K1⊙¯Kn
• Select a large prime number p = 11 and a generator g = 2 of the multiplicative group Zp*. Choose a private key x = 3 such that 1 ≤ x ≤ p−2 and gcd (x, p) = 1. Compute h = gx mod p = 23 mod 11 = 8.
• The public key is the tuple (p, g, h) = (11, 2, 8) and the private key is x = 3.
Encryption:
To encrypt a message “OPEN,” we assign M1 = 0 = 15, M2 = P = 16, M3 = E = 5, M4= N = 14.
Select a random integer k = 4 such that 1 ≤ k ≤ p−2 & gcd (k, p) = 1.
Find C1=gk mod p = 24 mod 11 = 5,
C2=M1.hk mod p = 15.84 mod 11 = 5,
C3=M2.hk mod p = 16.84 mod 11 = 9,
C4=M3.hk mod p = 5.84 mod 11 = 9,
C5=M4.hk mod p = 14.84 mod 11 = 1.
Convert the numeric value of C1, C2, C3, C4, and C5 as alphabetic character as “EEIIA”.
Sender send message “EEIIA” to the receiver.
Decryption:
Receiver now convert message to numeric value as C1 = 5, C2 = 5, C3 = 9, C4 = 9, C5 = 1. Compue M1=C2.(C1x)-1 mod P = 15. Similarly M2=C3.(C1x)-1 mod P=16, M3=C4.(C1x)-1 mod P= 5, M4 = C5.(C1x)-1 mod P = 14.
Now receiver convert numeric value to alphabetic character as “OPEN.” Hence receives original message “OPEN.”
In this study, the RSA and ElGamal cryptographic algorithms were implemented using the C# programming language to assess their performance across diverse data types, including mixed data (text, image, audio) (Adeniyi et al., 2023; Gountia et al., 2025). The evaluation focused on key performance metrics such as encryption time, decryption time, and memory usage. These metrics were systematically recorded and presented in tabular formats shown in Tables 1–9 with encryption and decryption times measured in seconds (s) and memory usage detailed in kilobytes (KB). To provide a clearer comparative analysis, Figures 1–12 is a graphical representations corresponding to each dataset were also generated, illustrating the time efficiency and memory consumption of both algorithms (Arhin et al., 2023; Utama Siahaan et al., 2018).

Table 7. Statistical analysis such as mean, standard deviation, performance metrics of encryption/decryption times (50 runs, AES-CBC 128-bit, RSA/ElGamal 2,048-bit, 10 rounds, star graph).

Table 9. Comparison of encryption/decryption times for AES-256, ECC, RSA, and ElGamal (single-round, star graph, 128-bit AES-CBC, 2,048-bit RSA/ElGamal/ECC).
Figure 1 results indicate that the RSA algorithm consumes less time during text data encryption compared to the ElGamal algorithm whereas Figure 2 shows that the RSA algorithm consumes more CPU internal memory while encrypting text data than the ElGamal algorithm.
Figure 3 shows that RSA algorithm consumes more CPU time during the decryption of text data while ElGamal consumes less CPU time during the decryption of text data. Figure 4 shows that both algorithms consume an equal volume of CPU internal memory to decrypt text data.
Figure 5 shows that RSA algorithm consumes less CPU time during the encryption of image data while ElGamal consumes more CPU time during the decryption of image data. Figure 6 shows that ElGamal consumes less memory during image data encryption than the RSA algorithm.
Figure 7 shows that RSA algorithm consumes more CPU time during the encryption of image data while ElGamal consumes less CPU time during the decryption of image data. Figure 8 shows that both algorithms consume an equal volume of CPU internal memory to decrypt text data.
Figure 9 shows that RSA algorithm consumes less CPU time during the encryption of audio data while ElGamal consumes more CPU time during the encryption of audio data. Figure 10 shows that ElGamal consumes less memory during audio data encryption than the RSA algorithm.
Figure 11 shows that RSA algorithm consumes more CPU time during the decryption of audio data while ElGamal consumes less CPU time during the decryption of audio data. Figure 12 shows that both algorithms consume an equal volume of CPU internal memory to decrypt audio data.
Table 1 presents the encryption time and memory usage for the text dataset using RSA and ElGamal cryptographic algorithms. The execution times were measured using the computer's CPU internal clock.
Table 2 shows the decryption time and memory usage of RSA and ElGamal cryptographic algorithms on the test dataset.
Table 3 shows the encryption time and memory usage of RSA and ElGamal cryptographic algorithms on the image dataset.
Table 4 shows the decryption time and memory usage of RSA and ElGamal cryptographic algorithms on the image dataset.
Table 5 shows the encryption time and memory usage of RSA and ElGamal cryptographic algorithms on the audio dataset.
Table 6 shows the decryption time and memory usage of RSA and ElGamal cryptographic algorithms on the audio dataset.
Table 7 explain a statistical analysis of 50 runs per file size, reporting mean encryption/decryption times and standard deviations. For example, RSA's mean encryption time for 22 KB text is 0.1082 s (SD: 0.002 s), and ElGamal's is 1.55 s (SD: 0.03 s). Table 7 also define throughput as file size divided by encryption time (KB/s). For example, RSA's throughput for 22 KB text is 203.3 KB/s (22/0.1082), while ElGamal's is 14.2 KB/s (22/1.55).
Table 8 extrapolate single-round times (e.g., RSA: ~0.0108 s for 22 KB text) and discuss applications: RSA's speed suits secure messaging (e.g., 50 KB audio), while ElGamal's security fits constrained devices.
Table 9 comparison with AES-256 (symmetric) and ECC (asymmetric). AES-256 encrypts faster (e.g., ~0.05 s for 550 KB image) but requires secure key exchange, where RSA/ElGamal excel, ECC is faster than ElGamal but less standard.
5 Discussion
In this study, two prominent asymmetric cryptographic algorithms—RSA and ElGamal—were implemented using the C# programming language to evaluate their performance across various data types, including text, image and audio files (Yousif, 2023).
5.1 Experimental setup
Hardware configuration: the simulations were conducted on a laptop equipped with a Windows 10 64-bit operating system, an Intel i7 processor running at 2.23 GHz, and 8 GB of RAM. Test Data: Randomly generated files of varying sizes−22 KB, 80 KB, 120 KB, 140 KB, 230 KB, 2048 KB, and 5120 KB—were used as input datasets. Implementation Details: Both RSA and ElGamal algorithms were implemented in C#, utilizing the Cipher Block Chaining (CBC) mode with key sizes of 64 bits and 128 bits. Each data block underwent 10 rounds of encryption and decryption, with execution times recorded for each run using the system's CPU internal clock. Encryption time: RSA consistently demonstrated faster encryption times across all data categories compared to ElGamal.
6 Conclusion
In this study, the RSA and ElGamal cryptographic algorithms were implemented using the C# programming language to evaluate their performance across various data types, including text, image, and audio files. The experimental results indicated that the RSA algorithm consistently outperformed ElGamal in terms of encryption time across all data categories. For instance, encrypting a 22 KB text file took ~0.1082 s with RSA, whereas ElGamal required about 1.55 s. This trend persisted across larger file sizes and different data types, including images and audio files. Conversely, ElGamal demonstrated superior performance in memory efficiency during both encryption and decryption processes. For the same 22 KB text file, RSA used about 169.82 KB of memory during encryption, while ElGamal utilized ~0.1650 KB. These findings suggest that RSA is more time-efficient, making it suitable for applications where speed is critical. On the other hand, ElGamal's lower memory consumption makes it preferable in environments with limited memory resources. This study contributes to the existing body of knowledge by providing a comprehensive analysis of the time and space complexities of RSA and ElGamal algorithms on mixed data types. Future research could explore additional performance metrics, such as throughput, accuracy, precision, and recall, or consider other cryptographic algorithms to further enhance the understanding of algorithm performance in various contexts (Yu et al., 2016).
Data availability statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.
Author contributions
YB: Validation, Formal analysis, Writing – original draft. BR: Writing – review & editing. DG: Supervision, Writing – review & editing.
Funding
The author(s) declare that no financial support was received for the research and/or publication of this article.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Generative AI statement
The author(s) declare that no Gen AI was used in the creation of this manuscript.
Publisher's note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
Adeniyi, A. E., Misra, S., Daniel, E., and Bokolo, A. Jr. (2022). Computational complexity of modified blowfish cryptographic algorithm on video data. Algorithms 15:373. doi: 10.3390/a15100373
Adeniyi, E. A., Imoize, A. L., Awotunde, J. B., Lee, C., Falola, P., Jimoh, R. G., et al. (2023). Performance analysis of two famous cryptographic algorithms on mixed data. J. Comput. Sci. 19, 694–706. doi: 10.3844/jcssp.2023.694.706
Ali, N., Sadiqa, A., Shahzad, M. A., Imran Qureshi, M., Siddiqui, H. M. A., Abdallah, S. A. O., et al. (2024). Secure communication in the digital age: a new paradigm with graph-based encryption algorithms. Front. Comput. Sci. 6:1454094. doi: 10.3389/fcomp.2024.1454094
Arhin, P. K. Jr., Asante, M., and Otoo, L. (2023). A comparative study of RSA and ELGAMAL cryptosystems. Int. J. Comput. Eng. 4, 33–41. doi: 10.47941/ijce.1291
Arora, R., Parashar, A., and Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. Int. J. Eng. Res. Appl. 3, 1922–1926.
Behera, R. R., and Gountia, D. (2024). A secure fault detection for digital microfluidic biochips. Comput. J. 68, 217–227. doi: 10.1093/comjnl/bxae106
Boni, S., Bhatt, J., and Bhat, S. (2015). Improving the Diffie-Hellman key exchange algorithm by proposing the multiplicative key exchange algorithm. Int. J. Comput. Appl. 130, 7–10. doi: 10.5120/ijca2015907170
Desai, A., Parekh, V., and Unadkat, U. N. (2022). “Performance analysis of various asymmetric public-key cryptosystem,” in Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022 (Singapore: Springer Nature Singapore), 437–449. doi: 10.1007/978-981-19-2840-6_34
Gountia, D., Behera, R., Bal, P., and Pati, S. (2025). Trojan detection in digital microfluidic biochips via image classification: a deep-learning based approach. IEEE Trans. Dependable Secure Comput. 22, 1−13. doi: 10.1109/TDSC.2025.3568217
Kayalvizhi, R., Vijayalakshmi, M., and Vaidehi, V. (2010). “Energy analysis of RSA and ElGamal algorithms for wireless sensor networks,” in CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings 3 (Cham: Springer Berlin Heidelberg), 172–180. doi: 10.1007/978-3-642-14478-3_18
Li, C. T., Weng, C. Y., Chen, C. L., Lee, C. C., Deng, Y. Y., and Imoize, A. L. (2022). An efficient authenticated key agreement scheme supporting privacy-preservation for internet of drones communications. Sensors 22:9534. doi: 10.3390/s22239534
Ni, B., Qazi, R., Ur Rehman, S., and Farid, G. (2021). Some graph-based encryption schemes. J. Math. 2021:6614172. doi: 10.1155/2021/6614172
Okeyinka, A. E. (2015). “Computational speeds analysis of RSA and ElGamal algorithms on text data,” in Proceedings of the World Congress on Engineering and Computer Science, Vol. 1, 21–23. Available online at: https://www.iaeng.org/publication/WCECS2015/WCECS2015_pp115-118.pdf (Accessed April 2, 2025).
Panda, M., and Nag, A. (2015). “Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux,” in 2015 Second International Conference on Advances in Computing and Communication Engineering (Dehradun: IEEE), 541–548. doi: 10.1109/ICACCE.2015.130
Parenreng, J. M., and Wahid, A. (2022). The E-mail security system using ElGamal hybrid algorithm and AES (advanced encryption standard) algorithm. Int. Things Artif. Intell. J. 2, 1–9. doi: 10.31763/iota.v2i1.510
Sari, P. P., Nababan, E. B., and Zarlis, M. (2020). “Comparative study of luc, ElGamal and RSA algorithms in encoding texts,” in 2020 3rd International Conference on Mechanical, Electronics, Computer and Industrial Technology (MECnIT) (Medan: IEEE), 148–151. doi: 10.1109/MECnIT48290.2020.9166586
Singh, S., Rathore, S., Alfarraj, O., Tolba, A., and Yoon, B. (2022). A framework for privacy-preservation of IoT healthcare data using federated learning and blockchain technology. Future Gener. Comput. Syst. 129, 380–388. doi: 10.1016/j.future.2021.11.028
Utama Siahaan, A. P., Elviwani, E., and Oktaviana, B. (2018). “Comparative analysis of RSA and ElGamal cryptographic public-key algorithms,” in Proceedings of the Joint Workshop KO2PI and the 1st International Conference on Advance and Scientific Innovation (ICASI'18) (Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 163–172. doi: 10.31227/osf.io/x56df
Yousif, S. F. (2023). Performance comparison between RSA and El-gamal algorithms for speech data encryption and decryption. Diyala J. Eng. Sci. 16, 123–137. doi: 10.24237/djes.2023.16112
Keywords: cryptography, star graph, asymmetric encryption, RSA, ElGamal, complexity
Citation: Banu Y, Rath BK and Gountia D (2025) Analyzing cryptographic algorithm efficiency with in graph-based encryption models. Front. Comput. Sci. 7:1630222. doi: 10.3389/fcomp.2025.1630222
Received: 17 May 2025; Accepted: 06 June 2025;
Published: 08 July 2025.
Edited by:
Pravas Ranjan Bal, Birla Institute of Technology, Mesra, IndiaReviewed by:
Sanjith Bharatharajan Nair, University of Nizwa, OmanSuvendra Kumar Jayasingh, Biju Patnaik University of Technology, India
Copyright © 2025 Banu, Rath and Gountia. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Yashmin Banu, yashmin.banu@giet.edu; Biplab Kumar Rath, biplab.rath@giet.edu; Debasis Gountia, dgountia@cs.iitr.ac.in