R
R
Robotex2011-03-01 19:03:23
Cryptography
Robotex, 2011-03-01 19:03:23

Asymmetric cryptosystem with maximum performance

Tell me, which algorithm will work most quickly and resource-intensively on a system with a limited amount of resources (say, not a very modern PDA)? Moreover, it has good cryptographic strength (this is critical).

Answer the question

In order to leave comments, you need to log in

3 answer(s)
W
Weageoo, 2011-03-02
@Weageoo

ECDSA

N
NeverWalkAloner, 2011-03-02
@NeverWalkAloner

Once I was at a presentation where they demonstrated the EDS system for mobile phones. So, on an old Nokia, the speaker signed messages with the ECDSA algorithm for 5-7 seconds. Of the standard and guaranteed robust methods, ECDSA provides the highest performance. Therefore, it is up to you to decide if this result suits you, then feel free to use ECDSA, or some ECDHIES if you need not a signature, but encryption.
If time is still critical, then analyze the so-called. fast digital signatures . The stability of these systems also does not raise questions, but I do not know if they are much faster than conventional ECDSA.
And finally, there is another type of HFE cryptosystems. They are used to generate very short digital signatures, the speed of work, as I heard, is much faster than conventional cryptosystems based on a discrete logarithm, but their stability causes, to put it mildly, concerns. So one of the first cryptosystems of this kind, Matsumo-Imai, has already been successfully cracked. So again, in my opinion, when looking for an alternative to ECDSA or RSA, you end up trading toughness for speed.

S
SkyKos, 2011-03-02
@SkyKos

Elliptic curve algorithms, as practice shows, have a higher speed. Also, the length of the keys in them is much smaller (according to the recommendations - about 160 bits versus 2048 for RSA).
As a library, I can recommend OpenSSL. Of the pluses - a large set of algorithms, the library is written in C (for embedded systems - this is a big plus). Of the minuses - unfortunately, there is no explicit implementation of the ECIES scheme (for the exchange of encrypted messages), but this scheme is easily created according to the description.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question