The University of Southampton
University of Southampton Institutional Repository

Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications

Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor’s algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.
Symmetric-key encryption, digital signatures, energy, key exchange protocols, public-key cryptography
2169-3536
76707 - 76719
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Shiu, Daniel
e3bf5576-12dd-49d5-ba2b-aa24067d1d5e
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Shiu, Daniel
e3bf5576-12dd-49d5-ba2b-aa24067d1d5e

Halak, Basel, Yilmaz, Yildiran and Shiu, Daniel (2022) Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications. IEEE Access, 10, 76707 - 76719. (doi:10.1109/ACCESS.2022.3192970).

Record type: Article

Abstract

Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor’s algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.

Text
Comparative_Analysis_of_Energy_Costs_of_Asymmetric_vs_Symmetric_Encryption-Based_Security_Applications - Version of Record
Download (1MB)

More information

Accepted/In Press date: 16 July 2022
Published date: 21 July 2022
Additional Information: Publisher Copyright: © 2013 IEEE.
Keywords: Symmetric-key encryption, digital signatures, energy, key exchange protocols, public-key cryptography

Identifiers

Local EPrints ID: 469889
URI: http://eprints.soton.ac.uk/id/eprint/469889
ISSN: 2169-3536
PURE UUID: b15d9fcd-dcdb-4ad9-b0e1-be4bed2221e5
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226
ORCID for Yildiran Yilmaz: ORCID iD orcid.org/0000-0002-5337-6090

Catalogue record

Date deposited: 28 Sep 2022 16:32
Last modified: 06 Jun 2024 01:49

Export record

Altmetrics

Contributors

Author: Basel Halak ORCID iD
Author: Yildiran Yilmaz ORCID iD
Author: Daniel Shiu

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×