Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach
Abstract
Evaluating the implementation of Elliptic Curve Cryptography (ECC) on Raspberry Pi includes execution time, memory usage, and energy consumption. Both basic operations and higher-level tasks are studied. The average execution time to perform scalar multiplication, one of the fundamental operations in ECC, is 15 ms; it uses 300 KB of memory and 80 mJ of energy. This makes it the most demanding of all basic operations in terms of these three metrics. In contrast, point addition is extremely efficient: with an execution time of 2.5 ms, memory usage at 100 KB, and consuming only 20 mJ to operate, it is perfect for real-time tasks. Higher-level operations like key exchange are even more demanding: they have average execution times of 25 ms, require 400 KB of memory, and consume 120 mJ to function, making them suitable only for occasional or initialization activities. The study points out the computational bottlenecks of scalar multiplication as well as the energy-intensive higher-level responsibilities that must be supported. Consequently, ECC is a practical means of performing lightweight authentication, transmitting secure information, and managing keys. Recommendations are made for improving the efficiency and extending the applicability of ECC in secure applications now on the horizon.
Authors

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.