Performance Evaluation of RSA and Elliptic Curve Cryptography

被引:0
|
作者
Singh, Soram Ranbir [1 ]
Khan, Ajoy Kumar [2 ]
Singh, Soram Rakesh [3 ]
机构
[1] Manipur Inst Technol, Imphal, Manipur, India
[2] Assam Univ, Silchar, India
[3] NIELIT Extens Ctr, Senapati, Manipur, India
关键词
RSA; Elliptic Curve Cryptography; ECDLP; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RSA and Elliptic Curve Cryptography (ECC) are the most common public cryptographic algorithms for encryption of symmetric keys which are used in https protocol and for digital signatures. The beauty of using ECC instead of using RSA is that machines which make use of ECC are likely to consume less system resources thereby ameliorating the performance of the machines. In this paper, we experimentally evaluate the performance of RSA and ECC.
引用
收藏
页码:302 / 306
页数:5
相关论文
共 50 条
  • [21] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [22] Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes
    Liu, Zhe
    Seo, Hwajeong
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3301 - 3310
  • [23] A performance evaluation of ARM ISA extension for elliptic curve cryptography over binary finite fields
    Bartolini, S
    Branovic, I
    Giorgi, R
    Martinelli, E
    16TH SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, PROCEEDINGS, 2004, : 238 - 245
  • [24] Juxtaposition of RSA and Elliptic Curve Cryptosystem
    Soram, Ranbir
    Khomdram, Memeta
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 11 - 21
  • [25] CREATING AN ELLIPTIC CURVE ARITHMETIC UNIT FOR USE IN ELLIPTIC CURVE CRYPTOGRAPHY
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 1457 - 1464
  • [26] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [27] Elliptic Curve Cryptography in Java']Java
    Deligiannidis, Leonidas
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 193 - 193
  • [28] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [29] Hyper-and-elliptic-curve cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
  • [30] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550