Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study

Ali Raya, K. Mariyappn
{"title":"Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study","authors":"Ali Raya, K. Mariyappn","doi":"10.23919/ICITST51030.2020.9351327","DOIUrl":null,"url":null,"abstract":"Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICITST51030.2020.9351327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.
资源有限环境下椭圆曲线密码的安全性与性能比较研究
如今,传感器和物联网设备等受限资源设备的使用正在迅速增加。这些设备通常处理敏感数据,同时具有有限的存储和低处理能力。这意味着在这些有限的环境中实现具有高级别安全性的协议可能相对困难,因为我们发现自己面临着性能和安全性之间的权衡。因此,最终的目标是找到一种既能达到良好的安全级别又能消耗很少资源的加密方案。本研究旨在通过比较ECC与其他公钥加密方案在密钥对生成、密钥交换和数字签名原语方面的性能和安全性来分析资源有限环境下椭圆曲线加密的性能和安全性。本文的比较结果促进了在资源有限的环境中使用ECC,并显示了ECC与其他公钥方案相比在时间和内存需求上的显著差异,特别是在安全性要求增加的情况下。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信