资源有限环境下椭圆曲线密码的安全性与性能比较研究

Ali Raya, K. Mariyappn
{"title":"资源有限环境下椭圆曲线密码的安全性与性能比较研究","authors":"Ali Raya, K. Mariyappn","doi":"10.23919/ICITST51030.2020.9351327","DOIUrl":null,"url":null,"abstract":"Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study\",\"authors\":\"Ali Raya, K. Mariyappn\",\"doi\":\"10.23919/ICITST51030.2020.9351327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.\",\"PeriodicalId\":346678,\"journal\":{\"name\":\"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICITST51030.2020.9351327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICITST51030.2020.9351327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,传感器和物联网设备等受限资源设备的使用正在迅速增加。这些设备通常处理敏感数据,同时具有有限的存储和低处理能力。这意味着在这些有限的环境中实现具有高级别安全性的协议可能相对困难,因为我们发现自己面临着性能和安全性之间的权衡。因此,最终的目标是找到一种既能达到良好的安全级别又能消耗很少资源的加密方案。本研究旨在通过比较ECC与其他公钥加密方案在密钥对生成、密钥交换和数字签名原语方面的性能和安全性来分析资源有限环境下椭圆曲线加密的性能和安全性。本文的比较结果促进了在资源有限的环境中使用ECC,并显示了ECC与其他公钥方案相比在时间和内存需求上的显著差异,特别是在安全性要求增加的情况下。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study
Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency YARAMON: A Memory-based Detection Framework for Ransomware Families Session 2: Information Security Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates Session 6: Information Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1