Enhancing RSA Algorithm Performance in Resource-Constrained IoT Networks.

Article Sidebar

Main Article Content

Chinatu M. Anyanwu (MSc)
Prof. G.E. Okereke (PhD)
Stephen Uche Edeh (MSc)
Onuoha M. Thomas (MSc)

The Internet of Things (IoT) introduces new security considerations because connected devices typically have limited computational resources, making traditional cryptographic algorithms inefficient. RSA, a widely used public-key cryptosystem, is particularly resource-intensive due to its large key sizes and heavy arithmetic operations. This study investigates the inefficiency of standard RSA in resource-constrained IoT environments and evaluates optimization strategies aimed at improving performance without compromising security. Enhancements include key size reduction, the use of the Chinese Remainder Theorem (CRT) for decryption, and precomputation techniques. Performance was assessed in a simulated IoT environment, measuring execution time, memory consumption, and energy efficiency. Security considerations, including potential vulnerabilities of CRT-based RSA such as differential fault attacks, were addressed through redundancy and verification mechanisms. Comparative insights with Elliptic Curve Cryptography (ECC) and post-quantum lightweight schemes (e.g., Ascon, Kyber-SLH-DSA) were provided to contextualize the results. The findings show that optimized RSA achieves significant reductions in computational overhead and energy consumption while maintaining correctness, demonstrating its feasibility for low-power IoT devices. Hybrid cryptography approaches, combining RSA key exchange with symmetric AES payload encryption, are recommended for future implementations. These results reinforce that efficient and practical public-key encryption is achievable in constrained IoT systems while preserving strong security.

Enhancing RSA Algorithm Performance in Resource-Constrained IoT Networks. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(11), 833-842. https://doi.org/10.51583/IJLTEMAS.2025.1411000077

Downloads

References

Abdelaal, M.A., Moustafa, A.I., Kasban, H., Saleh, H., Abdallah, H.A., & Afifi, M.Y.I. (2025). DNAInspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption Sensors, 25(7), 2322. https://doi.org/10.3390/s25072322.

Aljrees, T., Kumar, A., Singh, T. (2023). Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors, 23(19), 8090. https://doi.org/10.3390/s23198090.

Allioui, H., & Mourdi, Y. (2023). Exploring the Full Potentials of IoT for better Financial Growth and Stability: A Comprehensive Survey. Sensors, 23(19), 8015. https://doi.org/10.3390/s23198015.

Almutairi, M., & Sheldon, F.T. (2025). IoT-Cloud Integration Security: A Survey of Challenges, Solutions, and Directions. Electronics, 14(7), 1394. https://doi.org/10.3390/electronics14071394.

Bani Yassein, M., Qawasmeh, E., Khamayseh, Y., & Mardini, W. (2017). Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms. 2017 10th International Conference on Information and Communication technology for Embedded Systems (IC-ICTES). IEEE, 10-12 May 2017, Hebron, Palestine, pp. 1-6. https://doi.org/10.1109/ICEngTechnol.2017.8308215.

Bodur, H., & Kara, R. (2015). Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application. Retrieved from https://www.researchgate.net/publication/298298027 Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application/citation/download.

Diko, E., & Ibraimi, M. (2023). RSA & Extended Euclidean Algorithm with Example of Exponential RSA Ciphers, RSA Example Solution with Extended Euclidean Algorithm. Vision International Refereed Scientific Journal, 8(3), 161-175. https://doi.org/10.55843/ivisum23810161d.

Elamir, M., Mabrouk, M., & Marzouk, S. (2022). Secure Framework for IoT Technology Based on RSA and DNA Cryptography. Egyptian Journal of Medical human Genetics, 23(1), 46. https://doi.org/10.1186/s43042-022-00326-5.

Emam, A. (2017). Analysis of RSA Digital Signature Key generation using Strong Prime. International Journal of Computer (IJC), 24(9), 43-49.

Koulouras, G., Katsoulis, S., & Zantalis, F. (2025). Evolution of Bluetooth Technology: BLE in the IoT Ecosystem. Sensors, 25(4), 996. https://doi.org/10.3390/s25040996.

Ma, C. (2024). Exploring RSA Cryptography: Principles and Applications in Image Encryption and Microcontroller Security. Applied and Computational Engineering, 94.203-209. https://doi.org/10.54254/2721/94/2024MELB0091.

Mehta, J., & Rana, H. (2025). Safest-Value of the Number of Primes in RSA Modulus and an Improved Generalized Multi-Moduli RSA. Mathematics, 13(10), 1690. https://doi.org/10.3390/math13101690.

Mondal, S., & Primajaya, A. (2024). The Implementation of RSA Algorithm in Text Messages Encryption and Decryption. JATI (Jurnal Mahasiswa Teknik Informatika), 8(6), 12620-12624. https://doi.org/10.36040/jati.v8i6.12037.

Nagar, C., Vyas, D., & Malpani, D. (2017). Internet of Things (IoT): A Concept of Combining Computers, Sensors, and Networks to Monitor and Control Devices.

Nguyen, H.P., & Chen, Y. (2024). Lightweight, Post-Quantum Secure Cryptography Based on Ascon: Hardware Implementation in Automotive Applications. Electronics, 13(22), 4550. https://doi.org/10.3390/electronics13224550.

Patterson, J.C., Buchanan, W.J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), 42. https://doi.org/10.3390/jcp5030042.

Prakash, B., Srivast, S., Kumar, R., Prajapati, S., & Kaur, G. (2025). A Numerical and Security Analysis of RSA: From Classical Encryption to Post-Quantum Strategies. Preprint, 10.21203/rs.3.rs-6347614/v1.

Radhakrishnan, I., Jadon, S., & Honnavalli, P.B. (2024). Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors, 24(12), 4008. https://doi.org/10.3390/s24124008.

Rana, M., Mamun, Q., & Islam, M.R. (2021). Lightweight Cryptography in IoT Networks: A Survey. Future Generation Computer Systems, 129, 102103. https://doi.org/10.1016/j.future.2021.11.011.

Rana, M., Mamun, Q., & Islam, R. (2024). Balancing Security and Efficiency: A Power Consumption Analysis of a Lightweight Block Cipher. Electronics, 13(21). 4325. https://doi.org/10.3390/electronics13214325.

Sabri, O., Al-Shargabi, B., Abuarqoub, A., & Hakami, T.A. (2025). A Lightweight Encryption Method for IoT-Based Healthcare Applications: A Review and Future Prospects. IoT, 6(), 23. https://doi.org/10.3390/iot6020023.

Schizas, N., Karras, A., Karras, C., & Sioutas, S. (2022). TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review. Future Internet, 14(12), 363. https://doi.org/10.3390/fi14120363.

Taleb, F., & Toufik, L. (2024). Elliptic curves cryptography for lightweight devices in IoT systems. Brazilian Journal of Technology, 7, e73725. https://doi.org/10.38152/bjtv7n4-003.

Tanksale, V. (2024). Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices. Electronics, 13(18), 3631. https://doi.org/10.3390/electronics13183631.

Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and Security: Challenges and Solutions. Applied Sciences, 10(12), 4102. https://doi.org/10.3390/app10124102.

Yasar, K. (2025). What is the RSA Algorithm? TechTarget. Retrieved from https://www.techtarget.com/searchsecurity/definition/RSA.

Zhang, H., Yu, J., Tian, C., Tong, L., Lin, J., Ge, L., & Wang, H. (2020). Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet of Things Journal, (99): 1–1. https://doi.org/10.1109/JIOT.2020.2970499.

Article Details

How to Cite

Enhancing RSA Algorithm Performance in Resource-Constrained IoT Networks. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(11), 833-842. https://doi.org/10.51583/IJLTEMAS.2025.1411000077