• Türkçe
    • English
  • Türkçe 
    • Türkçe
    • English
  • Giriş
Öğe Göster 
  •   RTEÜ
  • Araştırma Çıktıları | TR-Dizin | WoS | Scopus | PubMed
  • WoS İndeksli Yayınlar Koleksiyonu
  • Öğe Göster
  •   RTEÜ
  • Araştırma Çıktıları | TR-Dizin | WoS | Scopus | PubMed
  • WoS İndeksli Yayınlar Koleksiyonu
  • Öğe Göster
JavaScript is disabled for your browser. Some features of this site may not work without it.

Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications

Thumbnail

Göster/Aç

Full Text / Tam Metin (1.033Mb)

Erişim

info:eu-repo/semantics/openAccess

Tarih

2022

Yazar

Halak, Basel
Yılmazi Yıldıran
Shiu, Daniel

Üst veri

Tüm öğe kaydını göster

Künye

Halak, B., Yilmaz, Y. & Shiu, D. (2022). Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications. IEEE Access, 10, 76707-76719. http://doi.org/10.1109/ACCESS.2022.3192970

Özet

Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor's algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.

Kaynak

IEEE Access

Cilt

10

Bağlantı

http://doi.org/10.1109/ACCESS.2022.3192970
https://hdl.handle.net/11436/7049

Koleksiyonlar

  • Bilgisayar Mühendisliği Bölümü Koleksiyonu [47]
  • Scopus İndeksli Yayınlar Koleksiyonu [5931]
  • WoS İndeksli Yayınlar Koleksiyonu [5260]



DSpace software copyright © 2002-2015  DuraSpace
İletişim | Geri Bildirim
Theme by 
@mire NV
 

 




| Yönerge | Rehber | İletişim |

DSpace@RTEÜ

by OpenAIRE
Gelişmiş Arama

sherpa/romeo

Göz at

Tüm DSpaceBölümler & KoleksiyonlarTarihe GöreYazara GöreBaşlığa GöreKonuya GöreTüre GöreDile GöreBölüme GöreKategoriye GöreYayıncıya GöreErişim ŞekliKurum Yazarına GöreBu KoleksiyonTarihe GöreYazara GöreBaşlığa GöreKonuya GöreTüre GöreDile GöreBölüme GöreKategoriye GöreYayıncıya GöreErişim ŞekliKurum Yazarına Göre

Hesabım

GirişKayıt

İstatistikler

Google Analitik İstatistiklerini Görüntüle

DSpace software copyright © 2002-2015  DuraSpace
İletişim | Geri Bildirim
Theme by 
@mire NV
 

 


|| Rehber|| Yönerge || Kütüphane || Recep Tayyip Erdoğan Üniversitesi || OAI-PMH ||

Recep Tayyip Erdoğan Üniversitesi, Rize, Türkiye
İçerikte herhangi bir hata görürseniz, lütfen bildiriniz:

Creative Commons License
Recep Tayyip Erdoğan Üniversitesi Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..

DSpace@RTEÜ:


DSpace 6.2

tarafından İdeal DSpace hizmetleri çerçevesinde özelleştirilerek kurulmuştur.