TY - GEN
T1 - Performance Characteristics of NTRU and ECC Cryptosystem in context of IoT Environment
AU - Upasana, Ipsita
AU - Nandanavanam, Nanditha
AU - Nandanavanam, Ankitha
AU - Naaz, Nadiya
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/10/30
Y1 - 2020/10/30
N2 - With the increased use of Internet-of- Things (IoT) devices for daily activities, the necessity of improving the speed and performance of such devices also arise. The devices produce sensitive data at a massive and rapid rate. Since the infrastructure available with such small-scale devices are constrained, an algorithm which provides better security performance and is faster within the constraints is necessitated. This paper discusses two asymmetric algorithms NTRU (Nth Degree Truncated Polynomial) and Elliptic Curve Cryptography (ECC), which are widely known to be secure. ECC is a popular algorithm and widely used because of its low-key size. However, it can be easily broken by quantum computers. NTRU is one of the most recognized algorithms that can resist even quantum attacks. It has less computational complexity due to simple polynomial operations. The need is for an algorithm to provide ample security while taking the time of the computational complexities into consideration. The performance of ECC and NTRU have been evaluated based on key generation time, encryption time, and decryption time. Text data provided by the small-scale IoT devices has been considered for analysis. The analysis gives a deeper view of both algorithms.
AB - With the increased use of Internet-of- Things (IoT) devices for daily activities, the necessity of improving the speed and performance of such devices also arise. The devices produce sensitive data at a massive and rapid rate. Since the infrastructure available with such small-scale devices are constrained, an algorithm which provides better security performance and is faster within the constraints is necessitated. This paper discusses two asymmetric algorithms NTRU (Nth Degree Truncated Polynomial) and Elliptic Curve Cryptography (ECC), which are widely known to be secure. ECC is a popular algorithm and widely used because of its low-key size. However, it can be easily broken by quantum computers. NTRU is one of the most recognized algorithms that can resist even quantum attacks. It has less computational complexity due to simple polynomial operations. The need is for an algorithm to provide ample security while taking the time of the computational complexities into consideration. The performance of ECC and NTRU have been evaluated based on key generation time, encryption time, and decryption time. Text data provided by the small-scale IoT devices has been considered for analysis. The analysis gives a deeper view of both algorithms.
UR - http://www.scopus.com/inward/record.url?scp=85099677413&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099677413&partnerID=8YFLogxK
U2 - 10.1109/DISCOVER50404.2020.9278074
DO - 10.1109/DISCOVER50404.2020.9278074
M3 - Conference contribution
AN - SCOPUS:85099677413
T3 - 2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2020 - Proceedings
SP - 23
EP - 28
BT - 2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2020 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2020
Y2 - 30 October 2020 through 31 October 2020
ER -