Performance Evaluation of RSA and Elliptic Curve Cryptography

被引:0
|
作者
Singh, Soram Ranbir [1 ]
Khan, Ajoy Kumar [2 ]
Singh, Soram Rakesh [3 ]
机构
[1] Manipur Inst Technol, Imphal, Manipur, India
[2] Assam Univ, Silchar, India
[3] NIELIT Extens Ctr, Senapati, Manipur, India
关键词
RSA; Elliptic Curve Cryptography; ECDLP; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RSA and Elliptic Curve Cryptography (ECC) are the most common public cryptographic algorithms for encryption of symmetric keys which are used in https protocol and for digital signatures. The beauty of using ECC instead of using RSA is that machines which make use of ECC are likely to consume less system resources thereby ameliorating the performance of the machines. In this paper, we experimentally evaluate the performance of RSA and ECC.
引用
收藏
页码:302 / 306
页数:5
相关论文
共 50 条
  • [31] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [32] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [33] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
  • [34] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [35] Compiler assisted elliptic curve cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
  • [36] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [37] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [38] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [39] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167
  • [40] Low power elliptic curve cryptography
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2007, 4644 : 310 - +