Benchmarking the Elliptic Curve Digital Signature Algorithm and RSA in Key Signing and Verification Operations with Parallelism
Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic c...
Saved in:
| Published in | 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) pp. 2521 - 2527 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
24.07.2023
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/CSCE60160.2023.00405 |
Cover
| Abstract | Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic curve cryptography, are widely used for their flexibility, encryption strength, and key management. This study focuses on comparing the performance of the Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA, specifically analyzing the impact of parallelism on signing and verification operations. The experimental results demonstrate that ECDSA is faster in signing but slower in verification compared to RSA. However, RSA's performance declines rapidly with increasing key sizes, while ECDSA exhibits a more graceful degradation. The study highlights the advantages of using elliptic curves in terms of reduced key sizes and the potential for ECDSA to become a preferred solution as security requirements increase. The paper's uniqueness is based on the impact of parallel processing on the performance of both cryptosystems. Future work involves further investigating the observed performance patterns and examining the implications of post-quantum resistance. |
|---|---|
| AbstractList | Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic curve cryptography, are widely used for their flexibility, encryption strength, and key management. This study focuses on comparing the performance of the Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA, specifically analyzing the impact of parallelism on signing and verification operations. The experimental results demonstrate that ECDSA is faster in signing but slower in verification compared to RSA. However, RSA's performance declines rapidly with increasing key sizes, while ECDSA exhibits a more graceful degradation. The study highlights the advantages of using elliptic curves in terms of reduced key sizes and the potential for ECDSA to become a preferred solution as security requirements increase. The paper's uniqueness is based on the impact of parallel processing on the performance of both cryptosystems. Future work involves further investigating the observed performance patterns and examining the implications of post-quantum resistance. |
| Author | Jim, Carol Dimitoglou, George |
| Author_xml | – sequence: 1 givenname: George surname: Dimitoglou fullname: Dimitoglou, George email: dimitoglou@hood.edu organization: Hood College,Dept. of Computer Science & Information Technology,Frederick,MD,USA – sequence: 2 givenname: Carol surname: Jim fullname: Jim, Carol email: jim@hood.edu organization: Hood College,Dept. of Computer Science & Information Technology,Frederick,MD,USA |
| BookMark | eNotT81OAjEYrIkeFHkDDt8LgG13u9seccWfSIIR9Uq63Y_li6WQUjScfHUXNHOYyWRmkrli52ETkLGB4CMhuLmp5tWk4KLgI8llNuI85-qM9U1pdKZ4Jktl1CX7ucXgVmsbPym0kFYIE-9pm8hBtY9fCHfUUrIe5tQGm_YRYezbTaS0WoMNDbzOx0ABnvFwihxXjvYHRlqSs4k2AWZbjCe1g--uCC82Wu_R0259zS6W1u-w_8899n4_easeh9PZw1M1ng5JCJOGslbLuta5tLIw2hitGiVQcKE7NKWTJqsbZwptXG5qVApdjlIq3SBvCiWzHhv87RIiLraRusuHheC5Louu_Av5y13I |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CSCE60160.2023.00405 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350327595 |
| EndPage | 2527 |
| ExternalDocumentID | 10487629 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-2b5fbb842a26989985d51e1018181d7c293bdc9689c49be55ec4e2258de0d6523 |
| IEDL.DBID | RIE |
| IngestDate | Wed May 01 11:49:11 EDT 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-2b5fbb842a26989985d51e1018181d7c293bdc9689c49be55ec4e2258de0d6523 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_10487629 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-July-24 |
| PublicationDateYYYYMMDD | 2023-07-24 |
| PublicationDate_xml | – month: 07 year: 2023 text: 2023-July-24 day: 24 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) |
| PublicationTitleAbbrev | CSCE |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8420681 |
| Snippet | Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 2521 |
| SubjectTerms | Benchmark testing Cryptography Degradation Elliptic curve cryptography Elliptic curves Encryption Parallel processing Resistance RSA |
| Title | Benchmarking the Elliptic Curve Digital Signature Algorithm and RSA in Key Signing and Verification Operations with Parallelism |
| URI | https://ieeexplore.ieee.org/document/10487629 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60J08qVnyzB6-JSZqku8caW4piLdZKb2Uf0zbYpiVNBL34191JUkVB8BaGkF12Z3ZmJ_PNR8gl95R0GqAtISfmguI1NZqUthp4JE6EcXoKwcn3vbA79G9HwagCqxdYGAAois_AxsfiX75eqhxTZcbCfTRevk22mywswVoVHM51-FU0iNrYXcSxkRPcRv0MfpCmFD6js0t6m9HKUpEXO8-krd5_NWL893T2SP0bnkf7X45nn2xBckA-ro18thBF7puasI5iOYY5EBSN8vQV6E08RYIQOoinZTdP2ppPl2mczRZUJJo-Dlo0TugdvBWv4FdQ_GxUdFIl9ujDCkqNWVNM4NK-SJGLZR6vF3Uy7LSfoq5VsStYsevyzPJkMJGS-Z7wkESSs0AHLhQNvEwM21QmDpBa8ZBx5XMJQQDKB2P9TIOjQ3N_PSS1ZJnAEaGBq3xhIhkZMvC5CAVzBPN4qDhXIXcbx6SOqzdelQ00xpuFO_lDfkp2cAcxher5Z6SWpTmcG9-fyYtizz8BtnOw_A |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI5gHOAEiCHe5MC1pe2SrjmOMTQeGxMDxG3Kw9sqWIe2Fgku_HXitoBAQuJWWVUTJXbsuP78EXIkAq28GhhHqqG9oAR1gyZlnBoeiUNpnZ5GcHKnG7bv2MUDfyjB6jkWBgDy4jNw8TH_l2-mOsNUmbVwhsYrFskSZ4zxAq5VAuJ8Txw3-80W9hfxXGQFd1FD-Q_alNxrnK2S7ud4RbHIo5ulytVvv1ox_ntCa6T6DdCjvS_Xs04WINkg7ydWPp7IPPtNbWBHsSDDHgmaNrPZC9DTeIQUIbQfj4p-nrTxNJrO4nQ8oTIx9KbfoHFCL-E1fwW_guJ7q6TDMrVHr5-h0Jk5xRQu7ckZsrE8xfNJldydtW6bbafkV3Bi3xepEyg-VCpigQyQRlJE3HAf8hZeNoqtaxsJKKNFGAnNhALOQTOw9h8Z8Exob7CbpJJME9gilPuaSRvLqDACJmQoI09GgQi1EDoUfm2bVHH1Bs9FC43B58Lt_CE_JMvt287V4Oq8e7lLVnA3MaEasD1SSWcZ7NtIIFUH-f5_ACYstEk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+Congress+in+Computer+Science%2C+Computer+Engineering%2C+%26+Applied+Computing+%28CSCE%29&rft.atitle=Benchmarking+the+Elliptic+Curve+Digital+Signature+Algorithm+and+RSA+in+Key+Signing+and+Verification+Operations+with+Parallelism&rft.au=Dimitoglou%2C+George&rft.au=Jim%2C+Carol&rft.date=2023-07-24&rft.pub=IEEE&rft.spage=2521&rft.epage=2527&rft_id=info:doi/10.1109%2FCSCE60160.2023.00405&rft.externalDocID=10487629 |