Abstract
During this current age of big data, the security of sensitive data in the cyberspace has become utmost important. Blockchain, as a new age technology, provides the necessary tools to ensure data integrity and data protection using some encryption. Smaller transaction size and higher transaction efficiency are the essential requirements of the blockchain. However, these requirements are closely related to the efficiency of the encryption algorithms that blockchain uses. In this paper, we have analyzed and compared the performance of Rivest-Shamir-Adleman (RSA) algorithm and Elliptic Curve Cryptography (ECC) algorithm that is most commonly used in blockchain by having a general consideration of a transaction size and transaction efficiency. We aim to provide a better understanding of the reason behind their extensive use in the blockchain. We hope that our evaluation and analysis of these two encryption algorithms can help promote the further development of blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schwab, K., Marcus, A., Oyola, JO., Hoffman, W., Luzi, M.: Personal data: the emergence of a new asset class. In an Initiative of the World Economic Forum (2011)
National security agency: The Case For Elliptic Curve Cryptography, (nsa.gov). http://www.nsa.gov/business/programs/elliptic_curve.html (2009). Last accessed 15 Jan 2009
Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures. (2004). Accessed on 28 Apr 2004
Lee Kuo Chuen, D. (ed.) Handbook of digital currency, 1st edn, Elsevier (2015)
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE 6th International Congress on Big Data, June 2017
Kumar, A., Tyagi, S.S., Rana, M., Aggarwal, N., Bhadana, P.: A comparative study of public key cryptosystem based on ECC and RSA, (May 2011)
https://lisk.io/academy/blockchain-basics/how-does-blockchain-work/blockchain-cryptography-explained
Symmetric vs Asymmetric Encryption—What are the differences? https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
https://www.techrepublic.com/article/how-blockchain-encryption-works-its-all-about-math/
Savari, M., Montazerolzohour, M., Thiam, Y.E.: Comparison of ECC and RSA algorithm in multipurpose smart card application
da Silva Quirin, G., Moreno, ED.: Architectural evaluation of algorithms RSA, ECC and MQQ in arm processors. Int. J. Comput. Net. Commun. (IJCNC). 5(2), (2013)
Ting-ting, G., Tao, L.: The implementation of RSA public-key algorithm and RSA signature algorithm. Department of Computer Science, Sichuan University (1999)
Han, M., Zhang, R., Qiu, T., Xu, M., Ren, W.: Multivariate, chaotic time series prediction based on improved grey relational analysis, Senior Member, IEEE (2017)
Michael Hamburg “Which one is better: elliptic curve cryptography or RSA algorithm and why?” https://www.quora.com/Which-one-is-better-elliptic-curve-cryptography-or-RSA-algorithm-and-why
Bafandehkar, M., Yasin, SM., Mahmod, R., Hanapi, Z.M.: Comparison of ECC and RSA algorithm in resource-constrained devices. In: International Conference on It Convergence & Security, 3 Jan 2013
Dong, D., Yan, Y., Wang, Z.: Application of grey correlative model for surface quality evaluation of strip steel based on the variation coefficient method. In: 2011 International Conference on Electronic & Mechanical Engineering and Information Technology
Primasari, C.H., Setyohadi, D.B.: Financial analysis and TOPSIS implementation for selecting the most profitable investment proposal in goat farming. In: 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (2017)
García-Cascales, M.S., Lamata, M.T.: On rank reversal and TOPSIS method. Math. Comput. Model. 56(5), 123–132 (2012)
Zhou, L., Wang, Y., Wang, F., Yan, C., Bi, J.: A transformer fault diagnosis method based on grey relational analysis and integrated weight determination, IEEE, (June 2017)
Khurana, A., Sharma, T., Shukla, K.K.: Optimization of parameters affecting the performance of wind turbine blade using grey relational analysis, IEEE (2017)
Lenstra, Arjen K, Key Lengths: Contribution to The Handbook of Information Security, Citibank, N.A., and Technische Universiteit Eindhoven, 1 North Gate Road, Mendham, NJ 07945–3104, U.S.A
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chandel, S., Cao, W., Sun, Z., Yang, J., Zhang, B., Ni, TY. (2020). A Multi-dimensional Adversary Analysis of RSA and ECC in Blockchain Encryption. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_67
Download citation
DOI: https://doi.org/10.1007/978-3-030-12385-7_67
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12384-0
Online ISBN: 978-3-030-12385-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)