IDEAS home Printed from https://ideas.repec.org/a/aac/ijirss/v8y2025i2p3966-3976id6195.html
   My bibliography  Save this article

Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach

Author

Listed:
  • Murtaja Ali Saare
  • Muhammad N. Jawad
  • Mahmood A. Al-Shareeda
  • Mohammed Amin Almaiah
  • Mansour Obeidat

Abstract

Evaluating the implementation of Elliptic Curve Cryptography (ECC) on Raspberry Pi includes execution time, memory usage, and energy consumption. Both basic operations and higher-level tasks are studied. The average execution time to perform scalar multiplication, one of the fundamental operations in ECC, is 15 ms; it uses 300 KB of memory and 80 mJ of energy. This makes it the most demanding of all basic operations in terms of these three metrics. In contrast, point addition is extremely efficient: with an execution time of 2.5 ms, memory usage at 100 KB, and consuming only 20 mJ to operate, it is perfect for real-time tasks. Higher-level operations like key exchange are even more demanding: they have average execution times of 25 ms, require 400 KB of memory, and consume 120 mJ to function, making them suitable only for occasional or initialization activities. The study points out the computational bottlenecks of scalar multiplication as well as the energy-intensive higher-level responsibilities that must be supported. Consequently, ECC is a practical means of performing lightweight authentication, transmitting secure information, and managing keys. Recommendations are made for improving the efficiency and extending the applicability of ECC in secure applications now on the horizon.

Suggested Citation

  • Murtaja Ali Saare & Muhammad N. Jawad & Mahmood A. Al-Shareeda & Mohammed Amin Almaiah & Mansour Obeidat, 2025. "Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach," International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 8(2), pages 3966-3976.
  • Handle: RePEc:aac:ijirss:v:8:y:2025:i:2:p:3966-3976:id:6195
    as

    Download full text from publisher

    File URL: https://ijirss.com/index.php/ijirss/article/view/6195/1165
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:2:p:3966-3976:id:6195. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.