Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor’s algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.
Symmetric-key encryption, digital signatures, energy, key exchange protocols, public-key cryptography
76707 - 76719
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Shiu, Daniel
e3bf5576-12dd-49d5-ba2b-aa24067d1d5e
21 July 2022
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Shiu, Daniel
e3bf5576-12dd-49d5-ba2b-aa24067d1d5e
Halak, Basel, Yilmaz, Yildiran and Shiu, Daniel
(2022)
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications.
IEEE Access, 10, .
(doi:10.1109/ACCESS.2022.3192970).
Abstract
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implementation of more effective attacks to derive the secret key. Most notably Shor’s algorithm exponentially speeds up solving the factoring, discrete logarithm (DLP), and elliptic-curve discrete logarithm (ECDLP) problems. To address this challenge, NIST has initiated a process to develop and standardize a new quantum-resistant public-key cryptographic algorithm. However, asymmetric encryption schemes are known to be computationally intensive, hence energy demanding. The proliferation of energy-constrained internet of things devices, combined with the need to adopt higher complexity quantum resilient cryptographic algorithms, makes it more challenging to continue to use public-key algorithms for all applications. One approach to address these challenges is to adopt symmetric key systems, which are known to be more energy-efficient and more resilient to quantum computers-based attacks. This work performs a comprehensive comparison of energy costs between asymmetric and symmetric key schemes. This comparison is performed using two methods. The first approach uses the energy cost of data usage (ECDU) metric to evaluate the global energy costs associated with internet data usage. It was found that the annual energy consumed by applications associated with public-key cryptography globally is sufficient to provide electricity for 1000 UK households for a year. The second method uses an experimental technique based on constructing a small-scale network of wireless embedded devices. This is subsequently used to compare two key establishment schemes, symmetric and asymmetric, which allows for comparing the computation and communication costs of each solution in a controlled environment, and more importantly estimating the energy consumed by each device participating in the protocol. Our results show that a 58% saving in global energy costs of public key-based applications can be achieved by adopting symmetric key systems. It was also found that a 20% reduction of the energy consumed by a wireless device during a key agreement protocol, can be achieved if symmetric key encryption is used.
Text
Comparative_Analysis_of_Energy_Costs_of_Asymmetric_vs_Symmetric_Encryption-Based_Security_Applications
- Version of Record
More information
Accepted/In Press date: 16 July 2022
Published date: 21 July 2022
Additional Information:
Publisher Copyright:
© 2013 IEEE.
Keywords:
Symmetric-key encryption, digital signatures, energy, key exchange protocols, public-key cryptography
Identifiers
Local EPrints ID: 469889
URI: http://eprints.soton.ac.uk/id/eprint/469889
ISSN: 2169-3536
PURE UUID: b15d9fcd-dcdb-4ad9-b0e1-be4bed2221e5
Catalogue record
Date deposited: 28 Sep 2022 16:32
Last modified: 06 Jun 2024 01:49
Export record
Altmetrics
Contributors
Author:
Basel Halak
Author:
Yildiran Yilmaz
Author:
Daniel Shiu
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics