物联网环境下NTRU和ECC密码系统的性能特征

Ipsita Upasana, Nanditha Nandanavanam, Ankitha Nandanavanam, Nadiya Naaz
{"title":"物联网环境下NTRU和ECC密码系统的性能特征","authors":"Ipsita Upasana, Nanditha Nandanavanam, Ankitha Nandanavanam, Nadiya Naaz","doi":"10.1109/DISCOVER50404.2020.9278074","DOIUrl":null,"url":null,"abstract":"With the increased use of Internet-of- Things (IoT) devices for daily activities, the necessity of improving the speed and performance of such devices also arise. The devices produce sensitive data at a massive and rapid rate. Since the infrastructure available with such small-scale devices are constrained, an algorithm which provides better security performance and is faster within the constraints is necessitated. This paper discusses two asymmetric algorithms NTRU (Nth Degree Truncated Polynomial) and Elliptic Curve Cryptography (ECC), which are widely known to be secure. ECC is a popular algorithm and widely used because of its low-key size. However, it can be easily broken by quantum computers. NTRU is one of the most recognized algorithms that can resist even quantum attacks. It has less computational complexity due to simple polynomial operations. The need is for an algorithm to provide ample security while taking the time of the computational complexities into consideration. The performance of ECC and NTRU have been evaluated based on key generation time, encryption time, and decryption time. Text data provided by the small-scale IoT devices has been considered for analysis. The analysis gives a deeper view of both algorithms.","PeriodicalId":131517,"journal":{"name":"2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Performance Characteristics of NTRU and ECC Cryptosystem in context of IoT Environment\",\"authors\":\"Ipsita Upasana, Nanditha Nandanavanam, Ankitha Nandanavanam, Nadiya Naaz\",\"doi\":\"10.1109/DISCOVER50404.2020.9278074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increased use of Internet-of- Things (IoT) devices for daily activities, the necessity of improving the speed and performance of such devices also arise. The devices produce sensitive data at a massive and rapid rate. Since the infrastructure available with such small-scale devices are constrained, an algorithm which provides better security performance and is faster within the constraints is necessitated. This paper discusses two asymmetric algorithms NTRU (Nth Degree Truncated Polynomial) and Elliptic Curve Cryptography (ECC), which are widely known to be secure. ECC is a popular algorithm and widely used because of its low-key size. However, it can be easily broken by quantum computers. NTRU is one of the most recognized algorithms that can resist even quantum attacks. It has less computational complexity due to simple polynomial operations. The need is for an algorithm to provide ample security while taking the time of the computational complexities into consideration. The performance of ECC and NTRU have been evaluated based on key generation time, encryption time, and decryption time. Text data provided by the small-scale IoT devices has been considered for analysis. The analysis gives a deeper view of both algorithms.\",\"PeriodicalId\":131517,\"journal\":{\"name\":\"2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DISCOVER50404.2020.9278074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER50404.2020.9278074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着物联网(IoT)设备在日常活动中的使用越来越多,提高这些设备的速度和性能的必要性也随之出现。这些设备以大量和快速的速度产生敏感数据。由于这种小型设备可用的基础设施受到限制,因此需要在约束条件下提供更好的安全性能和更快的算法。本文讨论了两种公认安全的非对称算法NTRU (n度截断多项式)和椭圆曲线加密(ECC)。ECC算法是一种流行的算法,由于其规模较小而被广泛使用。然而,它可以很容易地被量子计算机打破。NTRU是公认的甚至可以抵抗量子攻击的算法之一。由于多项式运算简单,计算复杂度较低。需要一种算法在考虑计算复杂性的同时提供足够的安全性。根据密钥生成时间、加密时间和解密时间对ECC和NTRU的性能进行了评价。小型物联网设备提供的文本数据已被考虑用于分析。该分析对这两种算法进行了更深入的分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Performance Characteristics of NTRU and ECC Cryptosystem in context of IoT Environment
With the increased use of Internet-of- Things (IoT) devices for daily activities, the necessity of improving the speed and performance of such devices also arise. The devices produce sensitive data at a massive and rapid rate. Since the infrastructure available with such small-scale devices are constrained, an algorithm which provides better security performance and is faster within the constraints is necessitated. This paper discusses two asymmetric algorithms NTRU (Nth Degree Truncated Polynomial) and Elliptic Curve Cryptography (ECC), which are widely known to be secure. ECC is a popular algorithm and widely used because of its low-key size. However, it can be easily broken by quantum computers. NTRU is one of the most recognized algorithms that can resist even quantum attacks. It has less computational complexity due to simple polynomial operations. The need is for an algorithm to provide ample security while taking the time of the computational complexities into consideration. The performance of ECC and NTRU have been evaluated based on key generation time, encryption time, and decryption time. Text data provided by the small-scale IoT devices has been considered for analysis. The analysis gives a deeper view of both algorithms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信