Performance Evaluation of RSA Variants For Network Security Using SIP
Networks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be car...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | Arabic |
| Published: |
College of Education for Pure Sciences
2025-07-01
|
| Series: | مجلة التربية والعلم |
| Subjects: | |
| Online Access: | https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849421899631689728 |
|---|---|
| author | Maan Alfathi Ali AL-ALLAWEE |
| author_facet | Maan Alfathi Ali AL-ALLAWEE |
| author_sort | Maan Alfathi |
| collection | DOAJ |
| description | Networks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be carefully deployed in data communication, especially real-time communication, such as voice over the Internet protocol. SIP is a real-time protocol that functions as a call initiator and controller, ensuring its communication is secure through various means. A cryptographic algorithm is a promising approach to secure SIP end-to-end communication. However, that does not come without cost and penalty, especially with performance. In this paper, we looked at how the SIP server performs using different RSA algorithms, including RSA-Standard, RSA Chinese Remainder Theorem, and Multi-prime RSA, by measuring CPU usage and how quickly calls are answered. The experiment reveals that when applying 1000 calls, the RSA standard consumes the highest CPU percentage. The decryption computations during the inbound calls scenario result in extra CPU usage for the three algorithms. In addition, call response time in all cases is still within an acceptable call response time level to spend 50 ms in higher call load 1000 calls. In sum, from these results, SIP service providers will gain a clear comprehension when it comes to deploying RSA algorithms in their services, which in turn facilitates smooth implementation in the voice communication industry and provides benchmarked material for research communities. |
| format | Article |
| id | doaj-art-c5edd772eb364c7fab9c41b496b103c6 |
| institution | Kabale University |
| issn | 1812-125X 2664-2530 |
| language | Arabic |
| publishDate | 2025-07-01 |
| publisher | College of Education for Pure Sciences |
| record_format | Article |
| series | مجلة التربية والعلم |
| spelling | doaj-art-c5edd772eb364c7fab9c41b496b103c62025-08-20T03:31:20ZaraCollege of Education for Pure Sciencesمجلة التربية والعلم1812-125X2664-25302025-07-01343263510.33899/edusj.2025.157805.1538187328Performance Evaluation of RSA Variants For Network Security Using SIPMaan Alfathi0Ali AL-ALLAWEE1Computer science, College of Education for Pure Science , university of mosul ,mosul,IraqComputer science, College of Education for Pure Science , university of mosul ,mosul,IraqNetworks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another. Recently, network security has had to be carefully deployed in data communication, especially real-time communication, such as voice over the Internet protocol. SIP is a real-time protocol that functions as a call initiator and controller, ensuring its communication is secure through various means. A cryptographic algorithm is a promising approach to secure SIP end-to-end communication. However, that does not come without cost and penalty, especially with performance. In this paper, we looked at how the SIP server performs using different RSA algorithms, including RSA-Standard, RSA Chinese Remainder Theorem, and Multi-prime RSA, by measuring CPU usage and how quickly calls are answered. The experiment reveals that when applying 1000 calls, the RSA standard consumes the highest CPU percentage. The decryption computations during the inbound calls scenario result in extra CPU usage for the three algorithms. In addition, call response time in all cases is still within an acceptable call response time level to spend 50 ms in higher call load 1000 calls. In sum, from these results, SIP service providers will gain a clear comprehension when it comes to deploying RSA algorithms in their services, which in turn facilitates smooth implementation in the voice communication industry and provides benchmarked material for research communities.https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdfnetworksnetworks securitysip server |
| spellingShingle | Maan Alfathi Ali AL-ALLAWEE Performance Evaluation of RSA Variants For Network Security Using SIP مجلة التربية والعلم networks networks security sip server |
| title | Performance Evaluation of RSA Variants For Network Security Using SIP |
| title_full | Performance Evaluation of RSA Variants For Network Security Using SIP |
| title_fullStr | Performance Evaluation of RSA Variants For Network Security Using SIP |
| title_full_unstemmed | Performance Evaluation of RSA Variants For Network Security Using SIP |
| title_short | Performance Evaluation of RSA Variants For Network Security Using SIP |
| title_sort | performance evaluation of rsa variants for network security using sip |
| topic | networks networks security sip server |
| url | https://edusj.uomosul.edu.iq/article_187328_d5a3b696f14c2a5c154ea584e49eb8ae.pdf |
| work_keys_str_mv | AT maanalfathi performanceevaluationofrsavariantsfornetworksecurityusingsip AT alialallawee performanceevaluationofrsavariantsfornetworksecurityusingsip |