The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Transport Layer Security (TLS) Protocol is the current de-facto standard for secure connections over an insecure medium; it combines asymmetric and symmetric cryptography to achieve authentication, confidentiality and message integrity. The flexibility of the TLS protocol regarding the algorithms used allows it to also run efficiently on mobile devices severely constrained in terms of available memory, computing power and energy. In this work we present a thorough performance evaluation of the TLS handshake process by breaking it down into its individual phases, with a focus on the comparison between the usually applied RSA algorithm and cryptographic primitives based on Elliptic Curve Cryptography (ECC). We are especially interested how the transition to more secure TLS cipher suites (like switching from one-way to mutual authentication or to ephemeral primitives) affects the load that is put on client and server when using RSA and ECC, respectively. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Koschuch, M., Hudler, M., & Krüger, M. (2012). The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA. In Communications in Computer and Information Science (Vol. 222 CCIS, pp. 71–83). https://doi.org/10.1007/978-3-642-25206-8_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free