Evaluating RSA Key Length: Impact on Security Hardness and Computational Efficiency
Evaluating RSA Key Length: Impact on Security Hardness and Computational Efficiency
(JOIREM)
Volume: 10 Issue: 08 | August-2024
Evaluating RSA Key Length: Impact on Security Hardness and Computational Efficiency
key length of RSA on security and computational concept of two keys (public key cryptography), it
efficiency, using simulation we evaluate how key uses two keys: Public Key and Private Key. Public key
length ranging from 1024 to 4096 bits perform for is for encryption and private key is for decryption.
Key Words: Cryptography, Asymmetric algorithm, number is multiplication of two large prime number
RSA ( Rivest, Shamir, and Adleman), Key lengths, and private key is derived from the same two prime
generating RSA keys of various lengths then Comparing the encryption and decryption
by using these key lengths, measuring the identify trends and trade-offs
trade between
this study are 1024, 2048, 3072, and 4096 bits. Analyzing the CPU and memory usage to
Data was collected in two primary categories: understand the computational cost
performance metrics and resource utilization. associated with each key length.
3. Security Implications:
1. Performance Metrics: Reviewing the theoretical
theoretic and practical
Encryption Time: The time taken to security
ty provided by each
e key length,
encrypt data with each key length. supported by existing literature and the
Decryption Time: The time taken performance data collected.
to decrypt data with each key
length. The results of this analysis were used to draw
2. Resource Utilization: conclusions about the optimal RSA key lengths for
CPU Usage: The percentage of CPU various applications, balancing the need for security
resources consumed
umed during against the constraints of computational resources.
Performance Metrics:
Generation of RSA keys of different length:
Use C++ and the OpenSSL library to
1. Encryption/Decryption Time: We measured
generate RSA keys of different
the time use in encryption and decryption
lengths.
process for each key length.
Measuring the encryption and decryption
2. Resource Utilization: We evaluated the
time. With the generated RSA keys we
computational resources (CPU, memory)
measure the encryption and decryption time.
consumed during encryption and decryption
With the help of C++ program, encrypt a
processes.
random plaintext, decrypts the cipher text,
3. Security Assessment: We analyzed the
and records the time taken for these
resilience of different key lengths against
operations. The program takes a key file,
factorization attacks algorithms, such as the
encrypts the randomly generated plaintext,
General Number Field Sieve (GNFS).
and the decrypts it, measuring time for both
operations. 3. RESULTS
Monitoring system resource usage during Encryption/Decryption Performance: Results
these operations. shows increase in encryption and decryption time
To monitor the memory and CPU usage during as key length increases.
encryption and decryption we look to Python
with the ‘psutil’ library. We run python script 1024-bit Keys: Fastest performance but its
with C++ performance measurement program security is insufficient for modern applications.
for each key file as a sub process and calculate
Metrics for RSA Key lengths Efficiency: The study shows the trade off between
security and computational efficiency in RSA Our research underscores the critical impact of
encryption. While longer key provides better RSA key length on both security and
security, they also demand more computational computational efficiency. While 2048-bit keys are
resources and time foe encryption and decryption suitable for general use, 3072-bit and 4096-bit
operations. keys are necessary for high-security applications.
The findings also highlight the need for ongoing
Current Best Practices: Based on our findings, for evaluation of cryptographic standards in response
most applications 2048 bit keys provides optimal to technological advancements, particularly the
balance, offers good security without any emergence of quantum computing. Future work
performance penalties. 3072 or 4096 bit keys are should focus on developing and adopting
recommended for application which require quantum-resistant cryptographic algorithms to
heightened security, such as financial transaction or ensure long-term security.
government communication despite the increased
computational overhead. REFERENCES
[1] Lenstra, A. K., & Verheul, E. R. (2001).
Implication of Quantum computing: Advancement in
Selecting cryptographic key sizes. Journal of
quantum computing poses a significant threat to RSA
cryptology, 14, 255-293.
encryption, for example Shor’s algorithm can factor
[2] M. Mohan, and J. Prakash, "Analysis of
large integers efficiently. Because of that the
various cryptographic algorithms,"
importance of quantum resistant algorithm will
International Journal of Engineering
increase, longer RSA key lengths provide interim
Technology, Management and Applied
security solutions, until such algorithm become
Sciences, 2(3), 201, pp. 51-61.
widely available.
[3] R. Kumar, and C. C. Ravindranath, "Analysis of
Diffie Hellman Key Exchange Algorithm with
Protection Against Attacks Proper key generation,
proposed Key Exchange Algorithm," Int. J.
including the use of strong random number
Emerg. Trends Technol. Comput. Sci., 4(1), 2015,
generators and secure prime number selection, is
pp. 40-43.
important to ensure that RSA keys are resistant
[4] Mahajan, Prerna, and Abhishek Sachdeva. "A
to attacks such as factorization or mathematical
study of encryption algorithms AES, DES and
vulnerabilities.
RSA for security." Global journal of computer
4. CONCLUSIONS science and technology 13.15 (2013): 15-22.
[5] Bisht, Nivedita, and Sapna Singh. "A Computer Applications(0975-8887) Volume 67-
comparative study of some symmetric and No. 19, April 2013.
asymmetric key cryptography [10] Lim, Meng-Hui, Sanggon Lee, and Sangjae
algorithms." International Journal of Innovative Moon. "Cryptanalysis of Tso et al.’s id-based
Research in Science, Engineering and tripartite authenticated key agreement
Technology 4.3 (2015): 1028-1031. protocol." International Conference on
[6] Arora, Priyanka, Arun Singh, and Himanshu Information Systems Security. Berlin,
Tiyagi. "Evaluation and comparison of security Heidelberg: Springer Berlin Heidelberg, 2007.
issues on cloud computing environment." World [11] Mahajan, Prerna, and Abhishek Sachdeva. "A
of Computer Science and Information study of encryption algorithms AES, DES and
Technology Journal (WCSIT) 2.5 (2012): 179-183. RSA for security." Global journal of computer
[7] Shashi Mehrota Seth, Rajan Mishra, science and technology 13.15 (2013): 15-22.
“Comparative Analysis of Encryption Algorithms [12] Jeeva, A. L., Dr V. Palanisamy, and K.
for Data Communication”, International Journal Kanagaram. "Comparative analysis of
of Computer Science and Technology, Vol. 2, performance efficiency and security measures
Issue 2, pp. 292-294, June 2011. of some encryption algorithms." International
[8] Ajay Kakkar, M.L Singh and P.K. Bansal, Journal of Engineering Research and
“Comparison of Various Encryption Algorithms Applications (IJERA) 2.3 (2012): 3033-3037.
and Techniques for Secured Data [13] Jolly Shah and Dr. Vikas Saxena,” Performance
Communication In Multinode Network”, Study on Image Encryption Schemes” In: IJCSI
International Journal of Engineering and International Journal of Computer Science
Technology Volume 2 No. 1, pp. 87-92, January Issues, Vol. 8, Issue 4.
2012. [14] Gurpreet Singh , Supriya, “A Study of Encryption
[9] Gurpreet Singh , Supriya, “A Study of Encryption Algorithms ( RSA, DES, 3DES and AES) for
Algorithms ( RSA, DES, 3DES and AES) for Information Security”, International Journal of
Information Security”, International Journal of omputer Applications(0975-8887) Volume 67-
No. 19, April 2013.