Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/570681.570691acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Performance analysis of elliptic curve cryptography for SSL

Published: 28 September 2002 Publication History

Abstract

Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. This is especially useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. However, the true impact of any public-key cryptosystem can only be evaluated in the context of a security protocol. This paper presents a first estimate of the performance improvements that can be expected in SSL (Secure Socket Layer), the dominant security protocol on the Web today, by adding ECC support.

References

[1]
IDC, "IDC envisions a time when majority of Internet access will be through wireless devices", see http://www.idc.com:8080/communications/press/pr/CM041000pr.stm
[2]
A. Frier, P. Karlton and P. Kocher, "The SSL3.0 Protocol Version 3.0", see http://home.netscape.com /eng/ssl3/.
[3]
S. Blake-Wilson and T. Dierks, "ECC Cipher Suites for TLS", Internet draft: draft-ietf-tls-ecc-01.txt, work in progress, Mar.\ 2001.
[4]
NIST, "Recommended Elliptic Curves for Federal Government Use", July 1999, see http://csrc.nist.gov/csrc/fedstandards.html.
[5]
V. Miller, "Uses of elliptic curves in cryptography", Lecture Notes in Computer Science 218: Advances in Cryptology - CRYPTO '85, pages 417--426, Springer-Verlag, Berlin, 1986.
[6]
N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48:203-209, 1987.
[7]
ANSI X9.62, "The Elliptic Curve Digital Signature Algorithm (ECDSA)", American Bankers Association, 1999.
[8]
ANSI X9.63, "Elliptic Curve Key Agreement and Key Transport Protocols", American Bankers Association, 1999.
[9]
T. Dierks and C. Allen, January 1999. "The TLS Protocol - Version 1.0.", IETF RFC 2246, see http://www.ietf.org/rfc/rfc2246.txt
[10]
The OpenSSL Project, see http://www.openssl.org/.

Cited By

View all
  • (2024)PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICESEskişehir Technical University Journal of Science and Technology A - Applied Sciences and Engineering10.18038/estubtda.142748825:2(278-288)Online publication date: 28-Jun-2024
  • (2024)Robust Strategies for Authenticating and Exchanging Secret Keys in Machine-to-Machine Communications with Enhanced SecurityCyber Security and Intelligent Systems10.1007/978-981-97-4892-1_18(209-221)Online publication date: 27-Dec-2024
  • (2022)Cluster-Based Authentication Process in a Smart CitySecurity and Communication Networks10.1155/2022/51863762022Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
September 2002
100 pages
ISBN:1581135858
DOI:10.1145/570681
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. elliptic curve cryptography (ECC)
  2. internet security
  3. secure socket layer (SSL)
  4. wireless

Qualifiers

  • Article

Conference

WiSe02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)52
  • Downloads (Last 6 weeks)6
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICESEskişehir Technical University Journal of Science and Technology A - Applied Sciences and Engineering10.18038/estubtda.142748825:2(278-288)Online publication date: 28-Jun-2024
  • (2024)Robust Strategies for Authenticating and Exchanging Secret Keys in Machine-to-Machine Communications with Enhanced SecurityCyber Security and Intelligent Systems10.1007/978-981-97-4892-1_18(209-221)Online publication date: 27-Dec-2024
  • (2022)Cluster-Based Authentication Process in a Smart CitySecurity and Communication Networks10.1155/2022/51863762022Online publication date: 1-Jan-2022
  • (2022)Simple Illustration and Gentle Description of ECC Process2022 International Conference on Big Data, Information and Computer Network (BDICN)10.1109/BDICN55575.2022.00077(387-390)Online publication date: Jan-2022
  • (2022)A secure IoT-based micro-payment protocol for wearable devicesPeer-to-Peer Networking and Applications10.1007/s12083-021-01242-y15:2(1163-1188)Online publication date: 17-Jan-2022
  • (2021)Smart Accounts for Decentralized Governance on Smart CitiesSmart Cities10.3390/smartcities40200454:2(881-893)Online publication date: 30-May-2021
  • (2021)Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)10.1109/ICCCIS51004.2021.9397166(256-262)Online publication date: 19-Feb-2021
  • (2021)Public Key Encryption in the Cloud Computing Environments: Trust and untrust2021 9th International Conference on Cyber and IT Service Management (CITSM)10.1109/CITSM52892.2021.9588879(1-5)Online publication date: 22-Sep-2021
  • (2021)An authenticated key scheme over elliptic curves for topological networksJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2020.186629825:8(2429-2448)Online publication date: 6-May-2021
  • (2020)MODBUS security scheme considering industrial control system layersJournal of Digital Contents Society10.9728/dcs.2020.21.3.63721:3(637-645)Online publication date: 31-Mar-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media