Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

A. Murat Fiskiran, R. B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations


In recent years, some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environments like mobile information appliances, where computing resources and power availability are limited. In this paper, we select a set of public-key, symmetric-key and hash algorithms suitable for such environments and study their workload characteristics. In particular, we study elliptic-curve versions of public-key cryptography algorithms, which allow fast software implementations while reducing the key size needed for a desired level of security compared to previous integer-based public-key algorithms. We characterize the operations needed by elliptic-curve analogs of Diffie-Hellman key exchange, ElGamal and the Digital Signature Algorithm for public-key cryptography, for different key sizes and different levels of software optimization. We also include characterizations for the Advanced Encryption Standard (AES) for symmetric-key cryptography, and SHA as a hash algorithm. We show that all these algorithms can be implemented efficiently with a very simple processor.

Original languageAmerican English
Title of host publication2002 IEEE International Workshop on Workload Characterization, WWC 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages11
ISBN (Electronic)0780376811, 9780780376816
StatePublished - 2002
EventIEEE International Workshop on Workload Characterization, WWC 2002 - Austin, United States
Duration: Nov 25 2002 → …

Publication series

Name2002 IEEE International Workshop on Workload Characterization, WWC 2002


OtherIEEE International Workshop on Workload Characterization, WWC 2002
Country/TerritoryUnited States
Period11/25/02 → …

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this