Analysis of Elliptic Curve Cryptography & RSA
Keywords:Cryptograph, RSA, Elliptic Curve Cryptography, Public Key Cryptography, security
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).
Chandel, S., Cao, W., Sun, Z., Yang, J., Zhang, B., and Ni, T. Y. ‘A multi-dimensional adversary analysis of RSA and ECC in block chain encryption’, In Future Information and Communication Conference Springer, Cham, pp. 988–1003. March. 2019.
Rivest, R. L., Shamir, A., and Adleman, L. ‘A method for obtaining digital signatures and public-key cryptosystems’. Communications of the ACM, vol. 212, pp. 120–12, 1978.
Kumar, A., Tyagi, S. S., Rana, M., Aggarwal, N., and Bhadana, P. ‘A comparativestudy of public key cryptosystem based on ECC and RSA’. International Journal on Computer Science and Engineering, vol. 35, pp. 1904–1909, 2011.
Sethi, P. C., Sahu, N., and Behera, P. K. ‘Group security using ECC’. International Journal of Information Technology, pp. 1–9, 2021.
Sethi, P. C., and Behera, P. K. ‘Network traffic management using dynamic bandwidth on demand’. International Journal of Computer Science and Information Security (IJCSIS), vol. 156, pp.369–375, 2017.
Kumar, S., and Paar, C. Are standards compliant elliptic curve cryptosystems feasible on RFID. In Workshop on RFID security Citeseer, July, pp. 12–14, 2006.
Bafandehkar, M., Yasin, S. M., Mahmod, R., and Hanapi, Z. ‘Comparison of ECC and RSA algorithm in resource constrained devices’. International conference on IT convergence and security (ICITCS) December. pp. 1–3, 2013.
Hankerson, D., Menezes, A. J., and Vanstone, S. ‘Guide to elliptic curve cryptography. Springer Science & Business Media’ 2006.
Thiranant, N., Lee, Y. S., and Lee, H. ‘Performance comparison between RSA and elliptic curve cryptography-based QR code authentication’. “2015” International Conference on Advanced Information Networking and Applications Workshops, pp. 278–282.
Mallouli, F., Hellal, A., Saeed, N. S., and Alzahrani, F. A. ‘A survey on Cryptography: comparative study between RSA vs ECC Algorithms,’ and RSA vs El-Gamal algorithms. 2019.
Fang, X., and Wu, Y. ‘Investigation into the elliptic curve cryptography.’ International Conference on Information Management (ICIM) IEEE, pp. 412–415.
Mohammed Shuaib, Shadab Alam, Mohammad Shabbir Alam, Mohammad Shahnawaz Nasir. Compliance with HIPAA and GDPR in block chain-based electronic health record’, Materials Today: Proceedings, pp. 2214–853, 2017.
Mohammed Shuaib, Shadab Alam, Mohammad Shahnawaz Nasir, Mohammad Shabbir Alam. ‘Immunity credentials using self-sovereign identity for combating COVID-19 pandemic’, Materials Today: Proceedings, pp. 2214–7853. 2022.
Mohammed Shuaib, Shadab Alam, Mohammad Shabbir Alam, Mohammad Shahnawaz Nasir. ‘Self-sovereign identity for healthcare using blockchain’, Materials Today: Proceedings, pp. 2214–7853, 2021. https://doi.org/10.1016/j.matpr.2021.03.083.
Syed MH, Upreti K, Nasir MS, Alam MS, Kumar Sharma. ‘Addressing image and Poisson noise deconvolution problem using deep learning approaches’. Computational Intelligence. pp. 1–15, 2022. doi: 10.1111/coin.12510.
Kumar, N., Upreti, K., and Mohan, D. ‘Blockchain Adoption for Provenance and Traceability in the Retail Food Supply Chain’. A Consumer Perspective. International Journal of E-Business Research (IJEBR), vol. 182, pp. 1–17. 2022. http://doi.org/10.4018/IJEBR.294110.
Upreti K., Singh U.K., Jain R., Kaur K., Sharma A.K. ‘Fuzzy Logic Based Support Vector Regression (SVR) Model for Software Cost Estimation Using Machine Learning’. In: Tuba M., Akashe S., Joshi A. (eds) ICT Systems and Sustainability. Lecture Notes in Networks and Systems, vol 321. Springer, Singapore, 2022. https://doi.org/10.1007/978-981-16-5987-4_90.
Upreti K., Kumar V., Pal D., Alam M.S., Sharma A.K. ‘Design and Development of Tracking System in Communication for Wireless Networking’. In: Nagar A.K., Jat D.S., Marín-Raventós G., Mishra D.K. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol. 334, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-6369-7_19.
K. Upreti, A. Verma, R. Jain and Y. Bekuma. ‘Broadcasting Scheme for Real Time Video in mobile Adhoc Network’. Turkish Journal of Computer and Mathematics Education, vol. 1211, pp. 3799–3803, 2021.
Palanikkumar, D., Upreti, K., Venkatraman, S., Suganthi, J. R., Kannan, S. et al. ‘Fuzzy Logic for Underground Mining Method Selection. Intelligent Automation & Soft Computing, vol. 323, pp. 1843–1854, 2021.
Kumar N., Singh M., Upreti K., and Mohan D. Block chain Adoption Intention in Higher Education: Role of Trust, Perceived Security and Privacy in Technology Adoption Model. In: Proceedings of International Conference on Emerging Technologies and Intelligent Systems. vol. 299. 2022. https://doi.org/10.1007/978-3-030-82616-1_27.
Upreti K., Kumar V., Pal D., Alam M.S., Sharma A.K. ‘Design and Development of Tracking System in Communication for Wireless Networking’. In: Intelligent Sustainable Systems. vol. 334, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-6369-7_19.
Kumar, N., Upreti, K., Upreti, S., Shabbir Alam, M., and Agrawal, M. 2021, Blockchain integrated flexible vaccine supply chain architecture: Excavate the determinants of adoption.’ Human Behavior and Emerging Technologies, 1–12, 2021. https://doi.org/10.1002/hbe2.302.
A.K. Sharma, Kamal Upreti, Binu Vargis. ‘Experimental performance analysis of load balancing of tasks using honey bee inspired algorithm for resource allocation in cloud environment’, Materials Today: Proceedings, pp. 2214–7853. 2022.
A. Sharma, U. K. Singh, K. Upreti, N. Kumar and S. K. Singh, A Comparative analysis of security issues & vulnerabilities of leading Cloud Service Providers and in-house University Cloud platform for hosting E-Educational applications. IEEE Mysore Sub Section International Conference (MysuruCon), pp. 552–560. 2021. doi: 10.1109/MysuruCon52639.2021.9641545.
A. Sharma, U. K. Singh, K. Upreti and D. S. Yadav. ‘An investigation of security risk & taxonomy of Cloud Computing environment,’ 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1056–1063, 2021. doi: 10.1109/ICOSEC51865.2021.9591954.
K. Upreti, B. K. Vargis, R. Jain and M. Upadhyaya. ‘Analytical Study on Performance of Cloud Computing with Respect to Data Security,’ 5th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 96–101, 2021. doi: 10.1109/ICICCS51141.2021.9432268.
Kamal Upreti, A.K. Sharma, Binu Vargis, Rajwinder Singh Sidhu. ‘An efficient approach for generating IRIS codes for optimally recognizing IRIS using multi objective genetic algorithm,’ Materials Today: Proceedings, pp. 2214–7853, 2022. https://doi.org/10.1016/j.matpr.2020.10.085.
Kamal Upreti, Mohammad Shahnawaz Nasir, Mohammad Shabbir Alam, Ankit Verma, A.K. Sharma. ‘Analyzing real time performance in Vigil Net using Wireless Sensor Network,’ Materials Today: Proceedings, pp. 2214–7853, 2021. https://doi.org/10.1016/j.matpr.2021.01.490.
Bao, Jiaxu. “Research on the security of elliptic curve cryptography.” 2022 7th International Conference on Social Sciences and Economic Development (ICSSED 2022). Atlantis Press, 2022.
Ullah, Shamsher, et al. “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.” Computer Science Review 47 (2023): 100530.
D. Boneh and H. Shacham, “Fast variants of RSA,” CryptoBytes, vol. 5, no. 1, pp. 1–9, 2002.
C. C. Chang and M. S. Hwang, “Parallel computation of the generating keys for RSA cryptosystems,” Electronics Letters, vol. 32, no. 15, pp. 1365–1366, 1996.
P. Verma, D. Mahto, S. K. Jha and D. K. Yadav, “Efficient RSA cryptosystem with key generation using matrix,” International Journal of Control Theory and Applications, vol. 10, no. 13, pp. 221–228, 2017.
A. Mansour, A. Davis, M. Wagner, R. Bassous, H. Fu and Y. Zhu, “Multi-asymmetric cryptographic RSA scheme,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, p. 9, 2017.
K. R. Santosh, C. Narasimham and P. Shetty, “Cryptanalysis of multi-prime RSA with two decryption exponents,” International Journal of Electronics and Information Engineering, vol. 4, no. 1, pp. 40–44, 2016.
X. D. Dong, “A multi-secret sharing scheme based on the crt and RSA,” International Journal of Electronics and Information Engineering, vol. 2, no. 1, pp. 47–51, 2015.
A. Takayasu and N. Kunihiro, “General bounds for small inverse problems and its applications to multiprime RSA,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 100, no. 1, pp. 50–61, 2017.
K. Bhardwaj and S. Chaudhary, “Implementation of elliptic curve cryptography in c,” International Journal on Emerging Technologies, vol. 3, no. 2, pp. 38–51, 2012.
Q. Qian, Y-L Jia and R. Zhang, “A lightweight rfid security protocol based on elliptic curve crytography,” International Journal Network Security, vol. 18, no. 2, pp. 354–361, 2016.
S. Basu, “A new parallel window-based implementation of the elliptic curve point multiplication in multi-core architectures,” Group, vol. 14, pp. 101–108, 2012.
M. S. Srinath and V. Chandrasekaran, “Isogenybased quantum-resistant undeniable blind signature scheme,” International Journal of Network Security, vol. 20, no. 1, pp. 8–17, 2018.
Saho, Nelson Josias Gbètoho and Eugène C. Ezin. “Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm.” (2020).