Performance Evaluation of RSA Variants For Network Security Using SIP

Networks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be car...

Full description

Saved in:
Bibliographic Details
Main Authors: Maan Alfathi, Ali AL-ALLAWEE
Format: Article
Language:Arabic
Published: College of Education for Pure Sciences 2025-07-01
Series:مجلة التربية والعلم
Subjects:
Online Access:https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849421899631689728
author Maan Alfathi
Ali AL-ALLAWEE
author_facet Maan Alfathi
Ali AL-ALLAWEE
author_sort Maan Alfathi
collection DOAJ
description Networks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be carefully deployed in data communication, especially real-time communication, such as voice over the Internet protocol. SIP is a real-time protocol that functions as a call initiator and controller, ensuring its communication is secure through various means. A cryptographic algorithm is a promising approach to secure SIP end-to-end communication. However, that does not come without cost and penalty, especially with performance. In this paper, we looked at how the SIP server performs using different RSA algorithms, including RSA-Standard, RSA Chinese Remainder Theorem, and Multi-prime RSA, by measuring CPU usage and how quickly calls are answered. The experiment reveals that when applying 1000 calls, the RSA standard consumes the highest CPU percentage. The decryption computations during the inbound calls scenario result in extra CPU usage for the three algorithms. In addition, call response time in all cases is still within an acceptable call response time level to spend 50 ms in higher call load 1000 calls. In sum, from these results, SIP service providers will gain a clear comprehension when it comes to deploying RSA algorithms in their services, which in turn facilitates smooth implementation in the voice communication industry and provides benchmarked material for research communities.
format Article
id doaj-art-c5edd772eb364c7fab9c41b496b103c6
institution Kabale University
issn 1812-125X
2664-2530
language Arabic
publishDate 2025-07-01
publisher College of Education for Pure Sciences
record_format Article
series مجلة التربية والعلم
spelling doaj-art-c5edd772eb364c7fab9c41b496b103c62025-08-20T03:31:20ZaraCollege of Education for Pure Sciencesمجلة التربية والعلم1812-125X2664-25302025-07-01343263510.33899/edusj.2025.157805.1538187328Performance Evaluation of RSA Variants For Network Security Using SIPMaan Alfathi0Ali AL-ALLAWEE1Computer science, College of Education for Pure Science , university of mosul ,mosul,IraqComputer science, College of Education for Pure Science , university of mosul ,mosul,IraqNetworks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be carefully deployed in data communication, especially real-time communication, such as voice over the Internet protocol. SIP is a real-time protocol that functions as a call initiator and controller, ensuring its communication is secure through various means. A cryptographic algorithm is a promising approach to secure SIP end-to-end communication. However, that does not come without cost and penalty, especially with performance. In this paper, we looked at how the SIP server performs using different RSA algorithms, including RSA-Standard, RSA Chinese Remainder Theorem, and Multi-prime RSA, by measuring CPU usage and how quickly calls are answered. The experiment reveals that when applying 1000 calls, the RSA standard consumes the highest CPU percentage. The decryption computations during the inbound calls scenario result in extra CPU usage for the three algorithms. In addition, call response time in all cases is still within an acceptable call response time level to spend 50 ms in higher call load 1000 calls. In sum, from these results, SIP service providers will gain a clear comprehension when it comes to deploying RSA algorithms in their services, which in turn facilitates smooth implementation in the voice communication industry and provides benchmarked material for research communities.https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdfnetworksnetworks securitysip server
spellingShingle Maan Alfathi
Ali AL-ALLAWEE
Performance Evaluation of RSA Variants For Network Security Using SIP
مجلة التربية والعلم
networks
networks security
sip server
title Performance Evaluation of RSA Variants For Network Security Using SIP
title_full Performance Evaluation of RSA Variants For Network Security Using SIP
title_fullStr Performance Evaluation of RSA Variants For Network Security Using SIP
title_full_unstemmed Performance Evaluation of RSA Variants For Network Security Using SIP
title_short Performance Evaluation of RSA Variants For Network Security Using SIP
title_sort performance evaluation of rsa variants for network security using sip
topic networks
networks security
sip server
url https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdf
work_keys_str_mv AT maanalfathi performanceevaluationofrsavariantsfornetworksecurityusingsip
AT alialallawee performanceevaluationofrsavariantsfornetworksecurityusingsip