2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS) 2018
DOI: 10.1109/icecs.2018.8617840
|View full text |Cite
|
Sign up to set email alerts
|

Exploring RSA Performance up to 4096-bit for Fast Security Processing on a Flexible Instruction Set Architecture Processor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…It is important to point out that this paper concentrates on private-key ciphers, yet there are numerous studies that have concentrated on the implementation of public-key algorithms and their ability to withstand attacks from third parties. As evidence of this, there have been studies on effective executions of public-key algorithms such as the elliptic curve and RSA [ 9 , 10 , 11 , 12 ], as well as theoretical attacks [ 13 , 14 , 15 ]. Consequently, this study concentrates on the implementation of a security system on private-key encryption systems, while public-key encryption systems are not included.…”
Section: Introductionmentioning
confidence: 99%
“…It is important to point out that this paper concentrates on private-key ciphers, yet there are numerous studies that have concentrated on the implementation of public-key algorithms and their ability to withstand attacks from third parties. As evidence of this, there have been studies on effective executions of public-key algorithms such as the elliptic curve and RSA [ 9 , 10 , 11 , 12 ], as well as theoretical attacks [ 13 , 14 , 15 ]. Consequently, this study concentrates on the implementation of a security system on private-key encryption systems, while public-key encryption systems are not included.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that there are many works that study public key encryption implementations and analyze their robustness against different attacks. As a brief example for the reader, efficient implementations of public key algorithms (ECC and RSA) are presented in [14][15][16][17], and theoretical attacks are described in [18][19][20]. Due to the great number of encryption systems that exist, as mentioned above, at this point we focus on the analysis of private key ciphers because public key ciphers are out of our scope.…”
Section: Introductionmentioning
confidence: 99%
“…Asymmetric cryptography is more secured than symmetric cryptography, but it is complex and uses much longer keys which in turn makes it slower and not industry-accepted, and not suitable for bulk data transmission than its counterpart symmetric cryptography. However, research is going on for the improvement of the performance of the asymmetric cryptography algorithm [2][3][4][5][6]. On the other hand, symmetric cryptography is less complex and executes faster than asymmetric cryptography, and so it has been accepted as an industry-standard cryptographic algorithm and is being widely used to secure sensitive, secret, or classified information in government, healthcare, banking, and other industries.…”
Section: Introductionmentioning
confidence: 99%