Skip to main content

A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing

  • Conference paper
  • First Online:
ICT with Intelligent Applications ( ICTIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 719))

Abstract

The rapid development of data generation and demand for real-time processing and analysis in the Internet of Things (IoT) has led to the emergence of new issues. In response, an extension of cloud computing, known as fog computing, aims to overcome these problems. It aims to bring computation, storage, and network services closer to the end-user by using a distributed computing infrastructure. With the ever-increasing need for secure communication in the digital age, the importance of encryption algorithms cannot be overstated. This study provides an analysis of two commonly used encryption techniques, Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), with a specific focus on cloud/fog computing. The research compares the key size and security level of the ECC and RSA algorithms and evaluates their suitability for usage in resource-constrained fog computing environments. ECC, a newer technique, offers the same level of security as RSA but uses smaller key sizes, making it more resource-efficient. The research highlights that the choice of encryption technique for cloud/fog computing depends on the system’s specific requirements. The study concludes that ECC could be recommended for improved security and faster performance without putting unnecessary strain on the computing resources. RSA, on the other hand, has been widely accepted and proven its security over the years. The comparison shows that the choice of encryption algorithm for cloud/fog computing depends on the specific requirements of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Paharia B, Bhushan K (2018) Fog computing as a defensive approach against distributed denial of service (ddos): a proposed architecture. In: 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (2018).

    Google Scholar 

  2. Sittón-Candanedo I, Alonso RS, Rodríguez-González S, García Coria JA, De La Prieta F (2020) Edge computing architectures in industry 4.0: a general survey and comparison springer international publishing

    Google Scholar 

  3. Díaz M, Martín C, Rubio B (2016) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl 67:99–117

    Google Scholar 

  4. Shu Z, Wan J, Zhang D, Li D (2016) Cloud-integrated cyber-physical systems for complex industrial applications. Mob Netw Appl 21(5):865–878

    Google Scholar 

  5. Chen Y, Sun E, Zhang Y (2017) Joint optimization of transmission and processing delay in fog computing access networks. In: 2017 9th international conference on advanced infocomm technology (ICAIT)

    Google Scholar 

  6. Sarkar S (2016) Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw 5(6):23–29

    Article  Google Scholar 

  7. Sari A (2018) Context-aware intelligent systems for fog computing environments for cyber-threat intelligence. In: Fog computing. Springer International Publishing

    Google Scholar 

  8. Khakimov A, Muthanna A, Muthanna MSA (2018) Study of fog computing structure. In: NW Russia young researchers in electrical and electronic engineering conference (EIConRusNW). IEEE

    Google Scholar 

  9. Pan J, McElhannon J (2018) Future edge cloud and edge computing for Internet of things applications. IEEE Int Things J 5:439–449

    Google Scholar 

  10. Lin C, Yang J (2018) Cost-efficient deployment of fog computing systems at logistics centers in industry 4.0. IEEE Trans Ind Inform 14:4603–4611

    Article  Google Scholar 

  11. Grover J, Jain A, Singhal S, Yadav A (2018) Real-time vanet applications using fog computing. In: Proceedings of first international conference on smart system, innovations and computing. Singapore

    Google Scholar 

  12. Shukla S, Hassan MF, Jung LT, Awang A (2019) Architecture for latency reduction in healthcare iot. Springer International Publishing

    Google Scholar 

  13. Manju AB, Sumathy S (2019) Efficient load balancing algorithm for task preprocessing in fog computing environment. In: Smart intelligent computing and applications, pp 291–298

    Google Scholar 

  14. Vasa J et al (2023) Architecture, applications and data analytics tools for smart cities: a technical perspective. In: Sentiment analysis and deep learning: proceedings of ICSADL 2022. Springer Nature Singapore, Singapore, pp 859–873

    Google Scholar 

  15. Mohamed N, Al-Jaroodi J, Jawhar I, Noura H, Mahmoud S (2017) Uavfog: a uav-based fog computing for internet of things. In: 2017 IEEE SmartWorld, ubiquitous intelligence & computing, advanced & trusted computed, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (smartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)

    Google Scholar 

  16. Ashrafi TH, Hossain MA, Arefin SE, Das KDJ, Chakrabarty A (2017) Iot infrastructure: fog computing surpasses cloud computing. In: Hu Y-C, Tiwari S, Mishra KK, Trivedi MC (eds) Intelligent communication and computational technologies, chapter: internet of things. Springer, Singapore

    Google Scholar 

  17. Campeanu G (2018) A mapping study on microservice architectures of Internet of things and cloud computing solutions. In: 2018 7th Mediterranean conference on embedded computing (MECO)

    Google Scholar 

  18. Chovatiya F et al (2018) A research direction on data mining with IoT. In: Inform Commun Technol Intell Syst (ICTIS 2017) 1:183–190

    Google Scholar 

  19. Gyandev Prajapati A, Jayantilal Sharma S, Sahebrao Badgujar V (2018) All about cloud: a systematic survey. In: 2018 international conference on smart city and emerging technology (ICSCET)

    Google Scholar 

  20. Rui J, Danpeng S (2016) Architecture design of the Internet of things based on cloud computing. In: 2015 seventh international conference on measuring technology and mechatronics automation

    Google Scholar 

  21. Pan J, Wang J, Hester A, Alqerm I, Liu Y, Zhao Y (2018) EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet of Things J 6(3):4719–4732

    Google Scholar 

  22. Kumar S (2006) Elliptic curve cryptography for constrained devices. Dissertation, Rurh-University Bochum

    Google Scholar 

  23. Wang Y, Streff K, Raman S (2012) Smartphone security challenges. Computer 45(12):52–58

    Article  Google Scholar 

  24. Rivest RL, Shamir A, Adelman L (1978) A method for obtaining digital signature and public-key cryptosystems. Commun ACM 21:120–126

    Article  MathSciNet  MATH  Google Scholar 

  25. Mansour A, Davis A, Wagner M, Bassous R, Fu H, Zhu Y (2017) Multi-asymmetric cryptographic RSA scheme. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–8)

    Google Scholar 

  26. Hong J-H (2000) RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family. Ph.D. dissertation, Dept. Elect. Eng., National Tsing Hua Univ., Hsinchu, Taiwan R.O.C

    Google Scholar 

  27. Nimbhorkar SU, Malik LG (2012) A survey on elliptic curve cryptography (ECC). Int J Adv Stud Comput Sci Eng 1(1):1–5

    Google Scholar 

  28. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:2003–2009

    Google Scholar 

  29. Miller V (1986) Use of elliptic curves in cryptography. Adv Cryptol CRYPTO ’85 LNCS 218(483)

    Google Scholar 

  30. Khoirom MS, Laiphrakpam DS, Themrichon T (2018) Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik

    Google Scholar 

  31. Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: A year in review. J Inf Secur Appl 48:102361

    Google Scholar 

  32. Käsper E (2011) Fast elliptic curve cryptography in OpenSSL. In: Proceedings of the 2011 international conference on financial cryptography and data security, Gros Islet, St. Lucia, 28 February–4 March 2011. Springer, Berlin/Heidelberg, Germany

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhaval Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, D., Patel, B., Vasa, J., Patel, M. (2023). A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing. In: Choudrie, J., Mahalle, P.N., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. ICTIS 2023. Lecture Notes in Networks and Systems, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-99-3758-5_5

Download citation

Publish with us

Policies and ethics