Performance Evaluation of RSA and Elliptic Curve Cryptography

被引:0
|
作者
Singh, Soram Ranbir [1 ]
Khan, Ajoy Kumar [2 ]
Singh, Soram Rakesh [3 ]
机构
[1] Manipur Inst Technol, Imphal, Manipur, India
[2] Assam Univ, Silchar, India
[3] NIELIT Extens Ctr, Senapati, Manipur, India
关键词
RSA; Elliptic Curve Cryptography; ECDLP; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RSA and Elliptic Curve Cryptography (ECC) are the most common public cryptographic algorithms for encryption of symmetric keys which are used in https protocol and for digital signatures. The beauty of using ECC instead of using RSA is that machines which make use of ECC are likely to consume less system resources thereby ameliorating the performance of the machines. In this paper, we experimentally evaluate the performance of RSA and ECC.
引用
收藏
页码:302 / 306
页数:5
相关论文
共 50 条
  • [1] Performance Evaluation of RSA Variants and Elliptic Curve Cryptography on Handheld Devices
    Bhatta, Jagdish
    Pandey, Lok Prakash
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (11): : 8 - 13
  • [2] Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks
    Kardi, Amine
    Zagrouba, Rachid
    Alqahtani, Mohammed
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [3] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [4] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography
    Thomas, Aswathi
    Manuel, Ebin M.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917
  • [5] Performance Comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication
    Thiranant, Non
    Lee, Young Sil
    Lee, HoonJae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 278 - 282
  • [6] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [7] Comparing elliptic curve cryptography and RSA on 8-bit CPUs
    Gura, N
    Patel, A
    Wander, A
    Eberle, H
    Shantz, SC
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 119 - 132
  • [8] Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm
    Yadav, Ashok Kumar
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 256 - 262
  • [9] The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation
    van Rijswijk-Deij, Roland
    Hageman, Kaspar
    Sperotto, Anna
    Pras, Aiko
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) : 738 - 750
  • [10] Performance analysis of elliptic curve cryptography on reconfigurable hardware
    Vig, Renu
    Tandon, Ravi
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 261 - +