Basit öğe kaydını göster

dc.contributor.authorHalak, Basel
dc.contributor.authorYılmazi Yıldıran
dc.contributor.authorShiu, Daniel
dc.date.accessioned2022-11-16T07:39:34Z
dc.date.available2022-11-16T07:39:34Z
dc.date.issued2022en_US
dc.identifier.citationHalak, B., Yilmaz, Y. & Shiu, D. (2022). Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications. IEEE Access, 10, 76707-76719. http://doi.org/10.1109/ACCESS.2022.3192970en_US
dc.identifier.issn2169-3536
dc.identifier.urihttp://doi.org/10.1109/ACCESS.2022.3192970
dc.identifier.urihttps://hdl.handle.net/11436/7049
dc.description.abstractPublic key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor's algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCostsen_US
dc.subjectEncryptionen_US
dc.subjectServersen_US
dc.subjectProtocolsen_US
dc.subjectPublic key cryptographyen_US
dc.subjectWireless communicationen_US
dc.subjectSocketsen_US
dc.subjectSymmetric-key encryptionen_US
dc.subjectPublic-key cryptographyen_US
dc.subjectKey exchange protocolsen_US
dc.subjectDigital signaturesen_US
dc.subjectEnergyen_US
dc.titleComparative analysis of energy costs of asymmetric vs symmetric encryption-based security applicationsen_US
dc.typearticleen_US
dc.contributor.departmentRTEÜ, Mühendislik ve Mimarlık Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.contributor.institutionauthorYılmaz, Yıldıran
dc.identifier.doi10.1109/ACCESS.2022.3192970en_US
dc.identifier.volume10en_US
dc.identifier.startpage76707en_US
dc.identifier.endpage76719en_US
dc.relation.journalIEEE Accessen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster