Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study

被引:0
作者
Raya, Ali [1 ]
Mariyappn, K. [1 ]
机构
[1] JAIN Univ, Dept Comp Sci Engn Cyber Secur Specializat, Bangalore, Karnataka, India
来源
INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020) | 2020年
关键词
Elliptic Curve Cryptography (ECC); Elliptic Curve Diffie-Hellman (ECDH); Elliptic Curve DSA (ECDSA); RSA; Diffie-Hellman; DSA;
D O I
10.23919/ICITST51030.2020.9351327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 23 条
  • [11] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [12] Mahto Dindayal, 2016, Proceedings of the World Congress on Engineering 2016, P419
  • [13] Martinez V. G, 2013, International Journal of Computer Science and Artificial Intelligence, V3, P134
  • [14] Milanov E., 2009, RSA laboratories, P1
  • [15] USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY
    MILLER, VS
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 417 - 426
  • [16] Neustadter D, 2008, ELLIPTIC CURVES PRIM
  • [17] Shaikh JR, 2017, IEEE INT CONF MICROW, P532
  • [18] Silverman JosephH., 2006, An introduction to the theory of elliptic curves
  • [19] Singh SR, 2016, 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), P24, DOI 10.1109/ICACDOT.2016.7877545
  • [20] Toradmalle Dhanashree, 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), P253, DOI 10.1109/I-SMAC.2018.8653689