Benchmarking the Elliptic Curve Digital Signature Algorithm and RSA in Key Signing and Verification Operations with Parallelism

Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic c...

Full description

Saved in:
Bibliographic Details
Published in2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) pp. 2521 - 2527
Main Authors Dimitoglou, George, Jim, Carol
Format Conference Proceeding
LanguageEnglish
Published IEEE 24.07.2023
Subjects
Online AccessGet full text
DOI10.1109/CSCE60160.2023.00405

Cover

Abstract Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic curve cryptography, are widely used for their flexibility, encryption strength, and key management. This study focuses on comparing the performance of the Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA, specifically analyzing the impact of parallelism on signing and verification operations. The experimental results demonstrate that ECDSA is faster in signing but slower in verification compared to RSA. However, RSA's performance declines rapidly with increasing key sizes, while ECDSA exhibits a more graceful degradation. The study highlights the advantages of using elliptic curves in terms of reduced key sizes and the potential for ECDSA to become a preferred solution as security requirements increase. The paper's uniqueness is based on the impact of parallel processing on the performance of both cryptosystems. Future work involves further investigating the observed performance patterns and examining the implications of post-quantum resistance.
AbstractList Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetric cryptographic protocols and algorithms, such as RSA and those based on elliptic curve cryptography, are widely used for their flexibility, encryption strength, and key management. This study focuses on comparing the performance of the Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA, specifically analyzing the impact of parallelism on signing and verification operations. The experimental results demonstrate that ECDSA is faster in signing but slower in verification compared to RSA. However, RSA's performance declines rapidly with increasing key sizes, while ECDSA exhibits a more graceful degradation. The study highlights the advantages of using elliptic curves in terms of reduced key sizes and the potential for ECDSA to become a preferred solution as security requirements increase. The paper's uniqueness is based on the impact of parallel processing on the performance of both cryptosystems. Future work involves further investigating the observed performance patterns and examining the implications of post-quantum resistance.
Author Jim, Carol
Dimitoglou, George
Author_xml – sequence: 1
  givenname: George
  surname: Dimitoglou
  fullname: Dimitoglou, George
  email: dimitoglou@hood.edu
  organization: Hood College,Dept. of Computer Science & Information Technology,Frederick,MD,USA
– sequence: 2
  givenname: Carol
  surname: Jim
  fullname: Jim, Carol
  email: jim@hood.edu
  organization: Hood College,Dept. of Computer Science & Information Technology,Frederick,MD,USA
BookMark eNotT81OAjEYrIkeFHkDDt8LgG13u9seccWfSIIR9Uq63Y_li6WQUjScfHUXNHOYyWRmkrli52ETkLGB4CMhuLmp5tWk4KLgI8llNuI85-qM9U1pdKZ4Jktl1CX7ucXgVmsbPym0kFYIE-9pm8hBtY9fCHfUUrIe5tQGm_YRYezbTaS0WoMNDbzOx0ABnvFwihxXjvYHRlqSs4k2AWZbjCe1g--uCC82Wu_R0259zS6W1u-w_8899n4_easeh9PZw1M1ng5JCJOGslbLuta5tLIw2hitGiVQcKE7NKWTJqsbZwptXG5qVApdjlIq3SBvCiWzHhv87RIiLraRusuHheC5Louu_Av5y13I
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSCE60160.2023.00405
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350327595
EndPage 2527
ExternalDocumentID 10487629
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-2b5fbb842a26989985d51e1018181d7c293bdc9689c49be55ec4e2258de0d6523
IEDL.DBID RIE
IngestDate Wed May 01 11:49:11 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-2b5fbb842a26989985d51e1018181d7c293bdc9689c49be55ec4e2258de0d6523
PageCount 7
ParticipantIDs ieee_primary_10487629
PublicationCentury 2000
PublicationDate 2023-July-24
PublicationDateYYYYMMDD 2023-07-24
PublicationDate_xml – month: 07
  year: 2023
  text: 2023-July-24
  day: 24
PublicationDecade 2020
PublicationTitle 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)
PublicationTitleAbbrev CSCE
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8420681
Snippet Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as...
SourceID ieee
SourceType Publisher
StartPage 2521
SubjectTerms Benchmark testing
Cryptography
Degradation
Elliptic curve cryptography
Elliptic curves
Encryption
Parallel processing
Resistance
RSA
Title Benchmarking the Elliptic Curve Digital Signature Algorithm and RSA in Key Signing and Verification Operations with Parallelism
URI https://ieeexplore.ieee.org/document/10487629
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60J08qVnyzB6-JSZqku8caW4piLdZKb2Uf0zbYpiVNBL34191JUkVB8BaGkF12Z3ZmJ_PNR8gl95R0GqAtISfmguI1NZqUthp4JE6EcXoKwcn3vbA79G9HwagCqxdYGAAois_AxsfiX75eqhxTZcbCfTRevk22mywswVoVHM51-FU0iNrYXcSxkRPcRv0MfpCmFD6js0t6m9HKUpEXO8-krd5_NWL893T2SP0bnkf7X45nn2xBckA-ro18thBF7puasI5iOYY5EBSN8vQV6E08RYIQOoinZTdP2ppPl2mczRZUJJo-Dlo0TugdvBWv4FdQ_GxUdFIl9ujDCkqNWVNM4NK-SJGLZR6vF3Uy7LSfoq5VsStYsevyzPJkMJGS-Z7wkESSs0AHLhQNvEwM21QmDpBa8ZBx5XMJQQDKB2P9TIOjQ3N_PSS1ZJnAEaGBq3xhIhkZMvC5CAVzBPN4qDhXIXcbx6SOqzdelQ00xpuFO_lDfkp2cAcxher5Z6SWpTmcG9-fyYtizz8BtnOw_A
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI5gHOAEiCHe5MC1pe2SrjmOMTQeGxMDxG3Kw9sqWIe2Fgku_HXitoBAQuJWWVUTJXbsuP78EXIkAq28GhhHqqG9oAR1gyZlnBoeiUNpnZ5GcHKnG7bv2MUDfyjB6jkWBgDy4jNw8TH_l2-mOsNUmbVwhsYrFskSZ4zxAq5VAuJ8Txw3-80W9hfxXGQFd1FD-Q_alNxrnK2S7ud4RbHIo5ulytVvv1ox_ntCa6T6DdCjvS_Xs04WINkg7ydWPp7IPPtNbWBHsSDDHgmaNrPZC9DTeIQUIbQfj4p-nrTxNJrO4nQ8oTIx9KbfoHFCL-E1fwW_guJ7q6TDMrVHr5-h0Jk5xRQu7ckZsrE8xfNJldydtW6bbafkV3Bi3xepEyg-VCpigQyQRlJE3HAf8hZeNoqtaxsJKKNFGAnNhALOQTOw9h8Z8Exob7CbpJJME9gilPuaSRvLqDACJmQoI09GgQi1EDoUfm2bVHH1Bs9FC43B58Lt_CE_JMvt287V4Oq8e7lLVnA3MaEasD1SSWcZ7NtIIFUH-f5_ACYstEk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+Congress+in+Computer+Science%2C+Computer+Engineering%2C+%26+Applied+Computing+%28CSCE%29&rft.atitle=Benchmarking+the+Elliptic+Curve+Digital+Signature+Algorithm+and+RSA+in+Key+Signing+and+Verification+Operations+with+Parallelism&rft.au=Dimitoglou%2C+George&rft.au=Jim%2C+Carol&rft.date=2023-07-24&rft.pub=IEEE&rft.spage=2521&rft.epage=2527&rft_id=info:doi/10.1109%2FCSCE60160.2023.00405&rft.externalDocID=10487629