Analysis of Elliptic Curve Cryptography & RSA

Authors

  • Mohammad Rafeek Khan Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA
  • Kamal Upreti Department of Computer Science, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, India
  • Mohammad Imran Alam Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA
  • Haneef Khan Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA
  • Shams Tabrez Siddiqui Department of Computer Science, CS & IT College, Jazan University, 45142, KSA
  • Mustafizul Haque Dr. D.Y. Patil Vidyapeeth’s Centre for Online Learning, Dr. D.Y. Patil Vidyapeeth, Pune (Deemed to be University), India
  • Jyoti Parashar Dept. of Computer Science & Engineering, Dr. Akhilesh Das Gupta Institute of Technology & Management, GGSIPU, New Delhi, India

DOI:

https://doi.org/10.13052/jicts2245-800X.1142

Keywords:

Cryptograph, RSA, Elliptic Curve Cryptography, Public Key Cryptography, security

Abstract

In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).

Downloads

Download data is not yet available.

Author Biographies

Mohammad Rafeek Khan, Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA

Mohammad Rafeek Khan is currently working a Lecturer with the Department of Computer and Network Engineering, College of Computer Science and Information Technology, Jazan University, Jazan, Saudi Arabia. He received his MCA degree from Aligarh Muslim University, Aligarh, India in 2007. He has published many articles in reputed journals. His research interests include Cryptographic Techniques & Security, Machine Learning and computer vision.

Kamal Upreti, Department of Computer Science, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, India

Kamal Upreti is currently working as an Associate Professor in Department of Computer Science, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, India. He completed is B. Tech (Hons) Degree from UPTU, M. Tech (Gold Medalist) from Galgotias University, PGDM (Executive) from IMT Ghaziabad and PhD from OPJ University in Department of Computer Science & Engineering. Now, he is doing Postdoc from National Taipei University of Business, TAIWAN funded by MHRD.

He has published 50+ Patents, 35+ Books, 32+ Magazine issues and 70+ Research papers in in various international Conferences and reputed Journals. His areas of Interest are Cyber Security, Machine Learning, Health Care, Wireless Networking, Embedded System and Cloud Computing.

Mohammad Imran Alam, Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA

Mohammad Imran Alam is currently working a Lecturer with the Department of Computer and Network Engineering, College of Computer Science and Information Technology, Jazan University, Jazan, Saudi Arabia. He received his MCA degree from Aligarh Muslim University, Aligarh, India in 2007. He has published many articles in reputed journals. He has more than 15 years of teaching experience. His research interests include Cryptographic Techniques, Block Chain, IoT and Machine Learning.

Haneef Khan, Department of Computer & Network Engineering, CS & IT College, Jazan University, 45142, KSA

Haneef Khan has been working as an Lecturer in the Department of Computer and Network Engineering, Jazan University, Jazan, KS. He has received the B.Tech. degree in electronics from UPTU, in 2008, and the M.Tech. degree in electronics from MDU, in 2012. He has more than 12 years of teaching experience. He has also undertaken funded projects as a principal investigator. His research interests include the Internet of Things, device-to-device communication, and blockchain.

Shams Tabrez Siddiqui, Department of Computer Science, CS & IT College, Jazan University, 45142, KSA

Shams Tabrez Siddiqui currently working as an Assistant Professor in the Department of Computer Science, Jazan University, Jazan, KSA. He received his PhD and MCA degree from Aligarh Muslim University, Aligarh, India in 2015 and 2007. He has worked as a counsellor for IGNOU. He has published more than 50 research papers in different reputed international/national journals, conference proceedings and book chapters. His research interest includes Software Requirement Engineering, Software Engineering and Software Security. He extended his research area to IoT, Wireless Sensor Networks, Cloud Computing and Blockchain. He is a member of the Computer Society of India, IAENG, ACM, IAENG, CSTA, ICSES and IACSIT. He worked as a reviewer for many journals.

Mustafizul Haque, Dr. D.Y. Patil Vidyapeeth’s Centre for Online Learning, Dr. D.Y. Patil Vidyapeeth, Pune (Deemed to be University), India

Mustafizul Haque, Associate Professor of Marketing Management, Dr. D.Y. Patil Vidyapeeth’s Centre for Online Learning, Dr. D.Y. Patil Vidyapeeth, Pune (Deemed to be University). I obtain B.com (2008) from Patna University, Patna, M.B.A (2010) from G.B.T.U, Lucknow, Doctoral Degree in 2015 Faculty of Management from B.R.A.B.U Muzaffarpur, Bihar, M.Com from MATS University, Raipur in (2018) and M.B.A (Fire & Safety Management) from National Institute of Fire & Safety Engineering, Nagpur in (2021). He has served as faculty member such as M.S college, Motihari; I.T.M, Aligarh; Aurora PG College (MBA), Hyderabad and G H Rai Soni University (M.P). He has contributed more than 40 Paper in SCI, ABDC, Springer, Scopus Index, National, International journals, Conferences, Seminars, FDP, MOUs and Ten Text Book Published and Eight Patent.

Jyoti Parashar, Dept. of Computer Science & Engineering, Dr. Akhilesh Das Gupta Institute of Technology & Management, GGSIPU, New Delhi, India

Jyoti Parashar is currently working as an Assistant Professor in Department of Computer Science & Engineering, Dr. Akhilesh Das Gupta Institute of Technology & Management (Formerly NIEC) affiliated to Guru Govind Singh Indraprastha University, Delhi, India. She has published Patents, Books, Magazine issues and Research papers in various international Conferences and reputed Journals. Her areas of Interest are Machine Learning, Health Care, Wireless, Cloud Computing, Internet of Things, Big Data, Ad Hoc Network and Internet security. She is having enriched years’ experience in corporate and teaching experience in Engineering Colleges.

References

Chandel, S., Cao, W., Sun, Z., Yang, J., Zhang, B., and Ni, T. Y. ‘A multi-dimensional adversary analysis of RSA and ECC in block chain encryption’, In Future Information and Communication Conference Springer, Cham, pp. 988–1003. March. 2019.

Rivest, R. L., Shamir, A., and Adleman, L. ‘A method for obtaining digital signatures and public-key cryptosystems’. Communications of the ACM, vol. 212, pp. 120–12, 1978.

Kumar, A., Tyagi, S. S., Rana, M., Aggarwal, N., and Bhadana, P. ‘A comparativestudy of public key cryptosystem based on ECC and RSA’. International Journal on Computer Science and Engineering, vol. 35, pp. 1904–1909, 2011.

Sethi, P. C., Sahu, N., and Behera, P. K. ‘Group security using ECC’. International Journal of Information Technology, pp. 1–9, 2021.

Sethi, P. C., and Behera, P. K. ‘Network traffic management using dynamic bandwidth on demand’. International Journal of Computer Science and Information Security (IJCSIS), vol. 156, pp.369–375, 2017.

Kumar, S., and Paar, C. Are standards compliant elliptic curve cryptosystems feasible on RFID. In Workshop on RFID security Citeseer, July, pp. 12–14, 2006.

Bafandehkar, M., Yasin, S. M., Mahmod, R., and Hanapi, Z. ‘Comparison of ECC and RSA algorithm in resource constrained devices’. International conference on IT convergence and security (ICITCS) December. pp. 1–3, 2013.

Hankerson, D., Menezes, A. J., and Vanstone, S. ‘Guide to elliptic curve cryptography. Springer Science & Business Media’ 2006.

Thiranant, N., Lee, Y. S., and Lee, H. ‘Performance comparison between RSA and elliptic curve cryptography-based QR code authentication’. “2015” International Conference on Advanced Information Networking and Applications Workshops, pp. 278–282.

Mallouli, F., Hellal, A., Saeed, N. S., and Alzahrani, F. A. ‘A survey on Cryptography: comparative study between RSA vs ECC Algorithms,’ and RSA vs El-Gamal algorithms. 2019.

Fang, X., and Wu, Y. ‘Investigation into the elliptic curve cryptography.’ International Conference on Information Management (ICIM) IEEE, pp. 412–415.

Mohammed Shuaib, Shadab Alam, Mohammad Shabbir Alam, Mohammad Shahnawaz Nasir. Compliance with HIPAA and GDPR in block chain-based electronic health record’, Materials Today: Proceedings, pp. 2214–853, 2017.

Mohammed Shuaib, Shadab Alam, Mohammad Shahnawaz Nasir, Mohammad Shabbir Alam. ‘Immunity credentials using self-sovereign identity for combating COVID-19 pandemic’, Materials Today: Proceedings, pp. 2214–7853. 2022.

Mohammed Shuaib, Shadab Alam, Mohammad Shabbir Alam, Mohammad Shahnawaz Nasir. ‘Self-sovereign identity for healthcare using blockchain’, Materials Today: Proceedings, pp. 2214–7853, 2021. https://doi.org/10.1016/j.matpr.2021.03.083.

Syed MH, Upreti K, Nasir MS, Alam MS, Kumar Sharma. ‘Addressing image and Poisson noise deconvolution problem using deep learning approaches’. Computational Intelligence. pp. 1–15, 2022. doi: 10.1111/coin.12510.

Kumar, N., Upreti, K., and Mohan, D. ‘Blockchain Adoption for Provenance and Traceability in the Retail Food Supply Chain’. A Consumer Perspective. International Journal of E-Business Research (IJEBR), vol. 182, pp. 1–17. 2022. http://doi.org/10.4018/IJEBR.294110.

Upreti K., Singh U.K., Jain R., Kaur K., Sharma A.K. ‘Fuzzy Logic Based Support Vector Regression (SVR) Model for Software Cost Estimation Using Machine Learning’. In: Tuba M., Akashe S., Joshi A. (eds) ICT Systems and Sustainability. Lecture Notes in Networks and Systems, vol 321. Springer, Singapore, 2022. https://doi.org/10.1007/978-981-16-5987-4_90.

Upreti K., Kumar V., Pal D., Alam M.S., Sharma A.K. ‘Design and Development of Tracking System in Communication for Wireless Networking’. In: Nagar A.K., Jat D.S., Marín-Raventós G., Mishra D.K. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol. 334, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-6369-7_19.

K. Upreti, A. Verma, R. Jain and Y. Bekuma. ‘Broadcasting Scheme for Real Time Video in mobile Adhoc Network’. Turkish Journal of Computer and Mathematics Education, vol. 1211, pp. 3799–3803, 2021.

Palanikkumar, D., Upreti, K., Venkatraman, S., Suganthi, J. R., Kannan, S. et al. ‘Fuzzy Logic for Underground Mining Method Selection. Intelligent Automation & Soft Computing, vol. 323, pp. 1843–1854, 2021.

Kumar N., Singh M., Upreti K., and Mohan D. Block chain Adoption Intention in Higher Education: Role of Trust, Perceived Security and Privacy in Technology Adoption Model. In: Proceedings of International Conference on Emerging Technologies and Intelligent Systems. vol. 299. 2022. https://doi.org/10.1007/978-3-030-82616-1_27.

Upreti K., Kumar V., Pal D., Alam M.S., Sharma A.K. ‘Design and Development of Tracking System in Communication for Wireless Networking’. In: Intelligent Sustainable Systems. vol. 334, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-6369-7_19.

Kumar, N., Upreti, K., Upreti, S., Shabbir Alam, M., and Agrawal, M. 2021, Blockchain integrated flexible vaccine supply chain architecture: Excavate the determinants of adoption.’ Human Behavior and Emerging Technologies, 1–12, 2021. https://doi.org/10.1002/hbe2.302.

A.K. Sharma, Kamal Upreti, Binu Vargis. ‘Experimental performance analysis of load balancing of tasks using honey bee inspired algorithm for resource allocation in cloud environment’, Materials Today: Proceedings, pp. 2214–7853. 2022.

A. Sharma, U. K. Singh, K. Upreti, N. Kumar and S. K. Singh, A Comparative analysis of security issues & vulnerabilities of leading Cloud Service Providers and in-house University Cloud platform for hosting E-Educational applications. IEEE Mysore Sub Section International Conference (MysuruCon), pp. 552–560. 2021. doi: 10.1109/MysuruCon52639.2021.9641545.

A. Sharma, U. K. Singh, K. Upreti and D. S. Yadav. ‘An investigation of security risk & taxonomy of Cloud Computing environment,’ 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1056–1063, 2021. doi: 10.1109/ICOSEC51865.2021.9591954.

K. Upreti, B. K. Vargis, R. Jain and M. Upadhyaya. ‘Analytical Study on Performance of Cloud Computing with Respect to Data Security,’ 5th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 96–101, 2021. doi: 10.1109/ICICCS51141.2021.9432268.

Kamal Upreti, A.K. Sharma, Binu Vargis, Rajwinder Singh Sidhu. ‘An efficient approach for generating IRIS codes for optimally recognizing IRIS using multi objective genetic algorithm,’ Materials Today: Proceedings, pp. 2214–7853, 2022. https://doi.org/10.1016/j.matpr.2020.10.085.

Kamal Upreti, Mohammad Shahnawaz Nasir, Mohammad Shabbir Alam, Ankit Verma, A.K. Sharma. ‘Analyzing real time performance in Vigil Net using Wireless Sensor Network,’ Materials Today: Proceedings, pp. 2214–7853, 2021. https://doi.org/10.1016/j.matpr.2021.01.490.

Bao, Jiaxu. “Research on the security of elliptic curve cryptography.” 2022 7th International Conference on Social Sciences and Economic Development (ICSSED 2022). Atlantis Press, 2022.

Ullah, Shamsher, et al. “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.” Computer Science Review 47 (2023): 100530.

D. Boneh and H. Shacham, “Fast variants of RSA,” CryptoBytes, vol. 5, no. 1, pp. 1–9, 2002.

C. C. Chang and M. S. Hwang, “Parallel computation of the generating keys for RSA cryptosystems,” Electronics Letters, vol. 32, no. 15, pp. 1365–1366, 1996.

P. Verma, D. Mahto, S. K. Jha and D. K. Yadav, “Efficient RSA cryptosystem with key generation using matrix,” International Journal of Control Theory and Applications, vol. 10, no. 13, pp. 221–228, 2017.

A. Mansour, A. Davis, M. Wagner, R. Bassous, H. Fu and Y. Zhu, “Multi-asymmetric cryptographic RSA scheme,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, p. 9, 2017.

K. R. Santosh, C. Narasimham and P. Shetty, “Cryptanalysis of multi-prime RSA with two decryption exponents,” International Journal of Electronics and Information Engineering, vol. 4, no. 1, pp. 40–44, 2016.

X. D. Dong, “A multi-secret sharing scheme based on the crt and RSA,” International Journal of Electronics and Information Engineering, vol. 2, no. 1, pp. 47–51, 2015.

A. Takayasu and N. Kunihiro, “General bounds for small inverse problems and its applications to multiprime RSA,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 100, no. 1, pp. 50–61, 2017.

K. Bhardwaj and S. Chaudhary, “Implementation of elliptic curve cryptography in c,” International Journal on Emerging Technologies, vol. 3, no. 2, pp. 38–51, 2012.

Q. Qian, Y-L Jia and R. Zhang, “A lightweight rfid security protocol based on elliptic curve crytography,” International Journal Network Security, vol. 18, no. 2, pp. 354–361, 2016.

S. Basu, “A new parallel window-based implementation of the elliptic curve point multiplication in multi-core architectures,” Group, vol. 14, pp. 101–108, 2012.

M. S. Srinath and V. Chandrasekaran, “Isogenybased quantum-resistant undeniable blind signature scheme,” International Journal of Network Security, vol. 20, no. 1, pp. 8–17, 2018.

Saho, Nelson Josias Gbètoho and Eugène C. Ezin. “Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm.” (2020).

Downloads

Published

2023-11-18

How to Cite

Khan, M. R. ., Upreti, K. ., Alam, M. I. ., Khan, H. ., Siddiqui, S. T. ., Haque, M. ., & Parashar, J. . (2023). Analysis of Elliptic Curve Cryptography & RSA. Journal of ICT Standardization, 11(04), 355–378. https://doi.org/10.13052/jicts2245-800X.1142

Issue

Section

Articles