Cover
Vol. 22 No. 1 (2026)

Published: June 15, 2026

Pages: 324-343

Original Article

Performance Analysis of Elliptic Curve Cryptography Digital Signature Algorithm

Abstract

Because elliptic curve cryptography offers a promising trade-off between security and computational performance, the field of current cryptographic techniques has taken a particular interest in it. Two basic digital signature algorithms—the Elliptic Curve Diffie-Hellman Algorithm (ECDH) and the Elliptic Curve Digital Signature Algorithm (ECDSA) are the subject of this performance analysis and comparison. These methods are based on elliptic curve cryptography. The analysis takes into consideration realistic application demands as well as factors like key length and security level. The results provide useful information on trade-offs between performance and security. A list of acceptable ECDSA requirements for digital signatures was used for the comparison. These characteristics are sign, sign/s, no PC verify, no PC verify/s, siglen, keygen, keygen/s, verify, and verify/s.

References

  1. V. V. Zubov, “An electronic signature within the digital economy,” in International Scientific Conference GCPMED, 2019.
  2. N. Saxena and N. S. Chaudhari, “Secure encryption with digital signature approach for short message service,” in 2012 World Congress on Information and Communication Technologies, pp. 803–806, IEEE, 2012.
  3. M. Al-Zubaidie and R. A. Muhajjar, “Integrating trustworthy mechanisms to support data and information security in health sensors,” Procedia Computer Science, vol. 237, p. 43 – 52, 2024.
  4. P. K. Shukla, A. Aljaedi, P. K. Pareek, A. R. Alharbi, and S. S. Jamal, “Aes based white box cryptography in digital signature verification,” Sensors, vol. 22, no. 23, p. 9444, 2022.
  5. W. A. Jebbar and M. Al-Zubaidie, “Transaction security and management of blockchain-based smart contracts in e-banking-employing microsegmentation and yellow saddle goatfish,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, p. 1 – 19, 2024.
  6. R. H. Razzaq and M. Al-Zubaidie, “Formulating an advanced security protocol for Internet of medical things based on blockchain and fog computing technologies,” Iraqi Journal for Computer Science and Mathematics, vol. 5, no. 3, p. 723 – 734, 2024.
  7. G. Uganya and R. Baskar, “Modified elliptic curve cryptography multi-signature scheme to enhance security in cryptocurrency.,” Computer Systems Science & Engineering, vol. 45, no. 1, 2023.
  8. M. Al-Zubaidie, Z. Zhang, and J. Zhang, “Efficient and secure ECDSA algorithm and its applications: A survey,” International Journal of Communication Networks and Information Security, vol. 11, no. 1, p. 7 – 35, 2019.
  9. I. Damg˚ard, T. P. Jakobsen, J. B. Nielsen, J. I. Pagter, and M. B. Østergaard, “Fast threshold ECDSA with honest majority,” Journal of Computer Security, vol. 30, no. 1, pp. 167–196, 2022.
  10. Y. Lindell and A. Nof, “Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837–1854, 2018.
  11. B. Jana and J. Poray, “A performance analysis on elliptic curve cryptography in network security,” in 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE), pp. 1–7, IEEE, 2016.
  12. S. Vasundhara, “Elliptic curve cryptography and diffiehellman key exchange,” IOSR Journal of Mathematics (IOSR-JM), vol. 13, no. 1, pp. 56–61, 2017.
  13. H. M. Al-Mashhadi and M. H. Alabiech, “Symmetric ecc with variable key using chaotic map,” International Journal of Computer Science Issues (IJCSI), vol. 14, no. 6, pp. 24–28, 2017.
  14. K. E. Abdullah and N. H. M. Ali, “A secure enhancement for encoding/decoding data using elliptic curve cryptography,” Iraqi Journal of Science, pp. 189–198, 2018.
  15. M. I. Jabiullah and K. N. Arifa, “An ecsda-based security approach on blockchain for cryptocurrencybased online transactions,” Recent Innovations in Wireless Network Security, vol. 2, no. 2, pp. 1–12, 2020.
  16. H. B. Mahajan and A. A. Junnarkar, “Smart healthcare system using integrated and lightweight ecc with private blockchain for multimedia medical data processing,” Multimedia Tools and Applications, vol. 82, no. 28, pp. 44335–44358, 2023.
  17. K. Singh, O. Dib, C. Huyart, and K. Toumi, “A novel credential protocol for protecting personal attributes in blockchain,” Computers & Electrical Engineering, vol. 83, p. 106586, 2020.
  18. S. Aikins-Bekoe and J. B. Hayfron-Acquah, “Elliptic curve diffie-hellman (ECDH) analogy for secured wireless sensor networks,” International Journal of Computer Applications, vol. 176, no. 10, pp. 1–8, 2020.
  19. A. Saepulrohman and T. P. Negara, “Implementation of elliptic curve diffie-hellman (ECDH) for encoding messeges becomes a point on the gf (pp),” 2020.
  20. G. Ogunleye and S. Akinsanya, “Elliptic curve cryptography performance evaluation for securing multi-factor systems in a cloud computing environment,” Iraqi Journal of Science, pp. 3212–3224, 2022.
  21. H. M. Al-Mashhadi and A. K. Ala’a, “Hybrid homomorphic cryptosystem for secure transfer of color image on public cloud,” International journal of computer science and network security, vol. 18, no. 3, pp. 48–55, 2018.
  22. W. Stallings, “Digital signature algorithms,” Cryptologia, vol. 37, no. 4, pp. 311–327, 2013.
  23. A. Khalique, K. Singh, and S. Sood, “Implementation of elliptic curve digital signature algorithm,” International journal of computer applications, vol. 2, no. 2, pp. 21– 27, 2010.
  24. O. S. Nagesh, V. S. Naresh, et al., “Comparative analysis of MOD-ECDH algorithm and various algorithms,” International Journal of Industrial Engineering & Production Research, vol. 31, no. 2, pp. 301–308, 2020.
  25. I. Cherkaoui, “Diffie-hellman multi-challenge using a new lossy trapdoor function construction.,” IAENG International Journal of Applied Mathematics, vol. 51, no. 3, 2021.
  26. M. S. Khan, D. S. Sakkari, et al., “Security and performance analysis of elliptic curve crypto system using bitcoin curves.,” IAENG International Journal of Computer Science, vol. 50, no. 2, 2023.
  27. L. Chen, D. Moody, A. Regenscheid, and K. Randall, “Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters,” tech. rep., National Institute of Standards and Technology, 2019.
  28. D. Hankerson and A. Menezes, “Elliptic curve cryptography,” in Encyclopedia of Cryptography, Security and Privacy, pp. 1–2, Springer, 2021.
  29. A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. CRC press, 2018.
  30. C. Paar and J. Pelzl, Understanding cryptography, vol. 1. Springer, 2010.
  31. M. Koppl, D. Siroshtan, M. Orgon, S. Pocarovsky, A. Bohacik, K. Kuchar, and E. Holasova, “Performance comparison of ECDH and ECDSA,” in 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), pp. 825–829, IEEE, 2021.
  32. M. Qu, “Sec 2: Recommended elliptic curve domain parameters,” Certicom Res., Mississauga, ON, Canada, Tech. Rep. SEC2-Ver-0.6, 1999.