The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) 2016
DOI: 10.1109/ic3i.2016.7917979
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of RSA and Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(28 citation statements)
references
References 3 publications
0
27
0
1
Order By: Relevance
“…One major operation ECPM uses 0.81s using 160 bits elliptic curve [25] and RSA 1024 bits M-Exp takes 22 seconds [26]. DES encryption and decryption execution time [27] is same which 4.543859 seconds. We calculate the computation cost of our scheme in comparison with the [8], [12] on the basis of the results of [23], [24], [26]- [28].…”
Section: A Computational Costmentioning
confidence: 91%
“…One major operation ECPM uses 0.81s using 160 bits elliptic curve [25] and RSA 1024 bits M-Exp takes 22 seconds [26]. DES encryption and decryption execution time [27] is same which 4.543859 seconds. We calculate the computation cost of our scheme in comparison with the [8], [12] on the basis of the results of [23], [24], [26]- [28].…”
Section: A Computational Costmentioning
confidence: 91%
“…(i) A secure elliptic curve ( ) is defined over a finite field , where is a large prime number such that the number is greater than 283 bits; that is, a 283-bit key in ECC is considered to be as secured as 3072-bit key in RSA [43,44]. Next, an order will be selected, together with the base point on the elliptic curve ( ), and the proper choice satisfies ⋅ = , where is the point at infinity.…”
Section: Initial Setup and Registration Phasementioning
confidence: 99%
“…Table 2 Comparison of key generation time and Table 3 Comparison of signature generation time Table 2 depicts the comparison of key generation time of RSA and ECC schemes [20]. By varying the key length from 1024 to 15,360 bits, the time required for key generation increases linearly.…”
Section: Rsa Vs Eccmentioning
confidence: 99%
“…Elliptic curve cryptosystems also are more computationally efficient RSA and Diffie-Hellman. The computation time of ECC is less when compared to RSA and Diffie Hellman, but it is more complex to implement [20]. RSA and Diffie-Hellman algorithms dominate public-key cryptography and have proved its efficiency in real-world applications.…”
Section: Rsa Vs Eccmentioning
confidence: 99%
See 1 more Smart Citation