{"title":"文献中ECC相关曲线的计算成本和能耗比较分析","authors":"Mohammed Elhajj, Pim Mulder","doi":"10.53375/ijecer.2023.318","DOIUrl":null,"url":null,"abstract":"With the Internet of Things (IoT) becoming expo-nentially more prevalent, the need for lightweight cryptography functions increases simultaneously. Namely, IoT end devices are mostly limited by their resource-constrained capabilities and therefore cannot rely on heavyweight cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) or Diffie-Hellman (DH) for security. Elliptic Curve Cryptography (ECC) offers a more lightweight alternative by being based on a mathematical prob-lem named the Elliptic Curve Discrete Logarithm Problem (ECDLP) which is not known to be solvable in sub-exponential time. Within the field of ECC, many different curve types exist following various standards for this protocol. In this paper, the energy consumption and time consumption for key generation, encryption, and decryption are measured within the ElGamal protocol using ECC for the various curves. To measure this, a Raspberry Pi 4B and a Personal Computer are used to conclude the disproval of the hypothesis that the Twisted Edwards curve performs most efficient to achieve its security strength. Namely, Brainpool curves function most efficient within this benchmark, after which Short Weierstrass curves follow. Moreover, it is concluded the performance pattern for both data processors and data providers is equal to each other for all message sizes.","PeriodicalId":111426,"journal":{"name":"International Journal of Electrical and Computer Engineering Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature\",\"authors\":\"Mohammed Elhajj, Pim Mulder\",\"doi\":\"10.53375/ijecer.2023.318\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the Internet of Things (IoT) becoming expo-nentially more prevalent, the need for lightweight cryptography functions increases simultaneously. Namely, IoT end devices are mostly limited by their resource-constrained capabilities and therefore cannot rely on heavyweight cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) or Diffie-Hellman (DH) for security. Elliptic Curve Cryptography (ECC) offers a more lightweight alternative by being based on a mathematical prob-lem named the Elliptic Curve Discrete Logarithm Problem (ECDLP) which is not known to be solvable in sub-exponential time. Within the field of ECC, many different curve types exist following various standards for this protocol. In this paper, the energy consumption and time consumption for key generation, encryption, and decryption are measured within the ElGamal protocol using ECC for the various curves. To measure this, a Raspberry Pi 4B and a Personal Computer are used to conclude the disproval of the hypothesis that the Twisted Edwards curve performs most efficient to achieve its security strength. Namely, Brainpool curves function most efficient within this benchmark, after which Short Weierstrass curves follow. Moreover, it is concluded the performance pattern for both data processors and data providers is equal to each other for all message sizes.\",\"PeriodicalId\":111426,\"journal\":{\"name\":\"International Journal of Electrical and Computer Engineering Research\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electrical and Computer Engineering Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53375/ijecer.2023.318\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical and Computer Engineering Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53375/ijecer.2023.318","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature
With the Internet of Things (IoT) becoming expo-nentially more prevalent, the need for lightweight cryptography functions increases simultaneously. Namely, IoT end devices are mostly limited by their resource-constrained capabilities and therefore cannot rely on heavyweight cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) or Diffie-Hellman (DH) for security. Elliptic Curve Cryptography (ECC) offers a more lightweight alternative by being based on a mathematical prob-lem named the Elliptic Curve Discrete Logarithm Problem (ECDLP) which is not known to be solvable in sub-exponential time. Within the field of ECC, many different curve types exist following various standards for this protocol. In this paper, the energy consumption and time consumption for key generation, encryption, and decryption are measured within the ElGamal protocol using ECC for the various curves. To measure this, a Raspberry Pi 4B and a Personal Computer are used to conclude the disproval of the hypothesis that the Twisted Edwards curve performs most efficient to achieve its security strength. Namely, Brainpool curves function most efficient within this benchmark, after which Short Weierstrass curves follow. Moreover, it is concluded the performance pattern for both data processors and data providers is equal to each other for all message sizes.