Next Article in Journal
Development of Lift Control System Algorithm and P-M-E Analysis in the Workplace
Previous Article in Journal
A TAM-Based Study of the Attitude towards Use Intention of Multimedia among School Teachers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications

1
Faculty of Technical Sciences, University Ismail Qemali, 9401 Vlora, Albania
2
Faculty of Electrical and Computer Engineering, University of Prishtina, 10000 Prishtina, Kosovo
*
Author to whom correspondence should be addressed.
Appl. Syst. Innov. 2018, 1(4), 37; https://doi.org/10.3390/asi1040037
Submission received: 27 August 2018 / Revised: 15 September 2018 / Accepted: 21 September 2018 / Published: 27 September 2018

Abstract

:
Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applications need to be fast, but not to lose their main security features. Authentication and encryption are the main processes in the security aspect, and are required for a secure communication. These processes can be executed in different devices, among them PCs, microprocessors, microcontrollers, biometric cards or mobile devices. Biometric identity cards are becoming increasingly popular, challenging traditional PC devices. This paper compares two processing systems, the efficiency of encryption and signatures on the data executed in national identity biometric card versus PC, known also as the match-on-card versus the match-off-card. It considers how different parameters impact the process and the role they play on the overall process. The results, executed with a predefined set of test vectors, determine which processing system to use in a certain situation. Final conclusions and recommendations are given taking into consideration the efficiency and security of the data.

1. Introduction

Biometric protocols are being used not only to authenticate an individual to an official authority but also to encrypt or sign a message. These protocols are based on biometric traits, which are universal and unique. There are a lot of methods to implement biometric identification, and a biometric card, usually known as a national electronic identification card (eID), is one of them.
Biometric eID cards can perform authentication, encryption and data signature, because of the private parameters (keys) stored on the card. The private parameters are stored in a card, as a biometric template during the enrolment stage. This template is used for comparison between the new template and corresponding template on the card, using two processing systems: match-off-card and match-on-card. Match-on-card compares the template of the card with the fresh template, while the processing of biometric data is done on the card and never leaves the card. On the other hand, match-off-card processing is not done on the card, but in and outside a device or system. Match-off-card and match-on-card are presented in Figure 1 and Figure 2.
Each processing system has its own advantages and disadvantages, as described in [1]. Match-off-card is faster, because of the processing power from the system, but because the biometric template leaves the card, this approach presents a security risk for the sensitive information inside the card. However, match-on-card has lower computation power, higher security because the biometric template does not leave the card, and lack of interoperability is a problem in this processing system [1]. A general introduction on the match-on-card can be found on [2], where the main advantages of this processing system are discussed, like a decentralized biometric database, data mobility, enhanced privacy and security [3].
Encryption processed with a biometric card was proposed in [4]. The encryption is done using the biometric key, a unique key generated from the biometric template inside the card. Except for the encryption process, this key can be used for the matching and authentication process also [4].
As the technology is progressing, a need for a faster data processing system is increasing too, making the speed the main parameter for analyzing. The National Institute of Standards and Technology (NIST) has done an evaluation of the accuracy and speed of fingerprint match-on-card process. Minimum error rate, the speed of execution, and the accuracy were only a few of the parameters tested in this experiment and discussed in an extended report [5]. Fingerprint authentication using a match-on-card is also presented in [6], where the authors observed the performance of successful and unsuccessful authentication. The positive verification time is slower than the negative verification time, which is also a security issue. In this paper, performance of enrollment and the false acceptance rate of the verification process are also analyzed.
NIST has done another experiment, a feasibility study, to determine if biometric match-on-card authentication could be performed in less than 2.5 s. The protocol for this operation consisted of few steps, presenting the card to the contactless reader from the cardholder, presenting the finger to the scanner, a secure session establishment process, transmitting the encrypted fingerprint template to the card, decrypting the template, and in the end returning the matching test result. In the report, the main parameters measured are average time to establish a secure session, average time for transmission of encrypted biometric data, and average total time to perform this complete process [7].
This paper proposes a different approach than the papers mentioned above. The main parameter is the efficiency of two processing systems, match-on-card versus match-off-card. This paper will not consider the enrolment or verification stage of the biometric card, but will just use the template for encryption and data signatures, and compares this process with the same process, using the personal computer (PC) as the processing device.
A national eID biometric card stores the private and public key of its holder. Those keys will be used to encrypt and sign the data, which represent the match-on-card processing system. The speed of the processing will be compared against the match-off-card.
Moreover, this paper does not address authentication of the user or the speed which the user authenticates himself. The main experiment compares match-on-card and match-off-card efficiency. The experiment takes into consideration different parameters, in the form of file size, processing algorithms for encryption, or signature. Each parameter plays a role, and it has an impact on the whole process regarding its efficiency.
This paper is organized as follows. Section 2 describes the national biometric identity card and its security features. In Section 3 we describe the architecture of the application used to perform the experiments. In Section 4 we show the results of the experiments. We conclude the paper with Section 5, in which we describe the main results from this paper, recommendations and possible future work.

2. National Biometric Identity Cards

A biometric identity card (ID) is a credit card size format and contains personal and biometric information about its holder in printed form as well as in electronic format and is used to authenticate its bearer in the real as well in the Internet world. Such electronic ID card uses proven smart card technology to communicate to the outside world, based on recommendations and guidelines issued by the International Civil Aviation Organization (ICAO), a body run by the United Nations with a mandate for setting international travel document standards [8]. A user profile stored in the biometric eID contains a digital X.509 certificate and its corresponding private key, in compliance with ICAO Public Key Infrastructure (PKI), signed by a country-issuing certification authority (CA).
The Ministry of Internal Affairs of the government of Kosovo issued first biometric national ID cards in December 2013, thus becoming the first country supporting the new Supplemental Access Control (SAC) protocol for mutual authentication [9].
The Kosovo national biometric ID card hosts three applications, as presented in Figure 3, and it uses a SLE 78CLX1280P 16 bit crypto processor from Infineon. It has 128 kByte Electrically Erasable Programmable Read-Only Memory (EEPROM) and supports Rivest–Shamir–Adleman (RSA) 4096 key bit length, elliptic-curve cryptography (ECC) up to 521 bit and triple Data Encryption Standard (3DES) and Advanced Encryption Algorithm (AES) up to 256 bit length and the communication with outside world is done using the near field communication (NFC) protocol [10].
The national ID card middleware communicates using the Public Key Cryptographic Standard (PKCS) #11 and Crypto Service Provider (CSP) with cryptographic interested apps. The web authentication with biometric ID card is done using X.509 certificates in two forms: (i) identity certificate or (ii) anonym certificate, whereby the corresponding 2048 bit private key never leaves the card [11]. Access to the private key is Personal Identification Number (PIN) protected, which is issued to the citizen in protected paper format. An Internet authentication scenario using a user’s real and anonym profile stored in the eID card is presented in [12].

3. Preparing Testing Environment

This section offers an insight on the environment of the experiment. From this section, anybody can replicate the experiment and test the results, using different parameters with predefined test vectors.

3.1. Developing the Application

BiometricEfficiency_FIEK is an open source application for the Windows 10 operating system, developed in C# programming language using Microsoft Visual Studio 2015. BiometricEfficiency_FIEK does not install other libraries and it does not need any other prerequisites to be installed. The source code can be found in [13].

3.2. Smart Card Middleware

Staring from Windows 2000, Microsoft has integrated the usage of smart cards in Windows applications, as presented in Figure 4 [14]. BiometricEfficiency_FIEK uses vendor-specific Crypto Service Provider (CSP) functionality, wrapped as middleware software, to access the full functionality of biometric card cryptographic functions, such as: encrypt, decrypt, sign and verify.

3.3. Pseudocode

The source code is organized in helper classes, one for encryption and one helper class for digital signature.
The encryption helper class contains three methods for implementing match-on-card and match-off-card encryption using RSA and RSA CSP classes from the Microsoft NET framework. Each method initially divides the test vector in blocks, to encrypt each block, since we work with block encryption algorithms. Following methods are developed:
  • encryptRSACSP_pc(text) takes one argument text of type string, which will be encrypted using the PC, using the public key stored locally on the PC.
  • encryptRSACSP_card(text, certificate) takes two arguments, text of type string and certificate of type X509Certificate2. This method encrypts using the RSA CSP class, with the public key from the certificate on the eID biometric card.
  • encryptRSA_card(text, certificate) also encrypts using the biometric card, but using RSA class.

function encryptRSACSP_pc(text)
{
   segmentLength ← 212
   loopLength ← text.Length/segmentLength+1

   RSACryptoServiceProvider rsa
   rsa.setPublicKey ← readPublicKey()

   for i←0 to loopLength do
     if (i=loopLength-1 or text.Length<segmentLength)
       copyLength ← text.Length-(i*segmentLength)
    else
       copyLength ← segmentLength

    segment ←text.Substring(i*segmentLength, copyLength);
    rsa.Encrypt(segment)
}


function encryptRSACSP_card(text, certificate)
{
  segmentLength ← 212;
  loopLength ← text.Length/segmentLength+1;

  RSACryptoServiceProvider rsa ← certificate.PublicKey.Key;
  for i ← 0 to i < loopLength do
    if (i=loopLength-1 or text.Length<segmentLength)
       copyLength ← text.Length-(i*segmentLength);
    else
      copyLength ← segmentLength;

    segment ← text.Substring(i*segmentLength, copyLength);
    rsa.Encrypt(segment);
}


function encryptRSA_card(text, certificate)
{
  segmentLength ← 212
  loopLength ← text.Length/segmentLength+1

  RSA rsa ← certificate.GetRSAPublicKey()

  for i←0 to loopLength do
    if (i=loopLength-1 or text.Length<segmentLength)
      copyLength ← text.Length-(i*segmentLength)
    else
       copyLength ← segmentLength

    segment ← text.Substring(i*segmentLength, copyLength);
    rsa.Encrypt(segment)
}

The signature helper class contains three methods for implementing match-on-card and match-off-card digital signature using RSA and RSA CSP classes, as:
  • signRSACSP_pc(text) method is used to sign the text data, using the asymmetric algorithm RSA CSP, using the private key stored on the PC.
  • signRSACSP_card(text, certificate) will be used as a method to sign the text data, using the private key in the certificate.
  • signRSA_card(text, certificate) takes two arguments, one the text to sign, and the certificate, which uses the private key to digitally sign the data, with RSA class.

function signRSACSP_pc(text)
{
  RSACryptoServiceProvider rsa
  rsa.setPublicKey ← readPublicKey()

  rsa.SignData(text);
}


function signRSACSP_card(text, certificate)
{
  RSACryptoServiceProvider rsacsp ← certificate.PrivateKey
  rsacsp.SignData(text)
}


function signRSA_card(text, certificate)
{
   RSA rsa ← certificate.PrivateKey
  rsa.SignData(text)
}

3.4. Software Functionalities

BiometricEfficiency_FIEK has a simple interface, as presented in Figure 5. The application is used to encrypt or sign data, using the processing power of the PC or the processing power of a national biometric card. The main purpose of the application is to measure the efficiency, or the processing time of both those processing methods: match-off-card and match-on-card systems. This application is primarily used for experimental purposes, not for encryption or signing data.
The test data used here are random text files of different lengths, which offers the opportunity to study the impact of length or size of the file on the processing time.
The basic steps for encrypting or signing data, with one of the processing systems are:
  • The first step is to choose the size of the text file which will be encrypted or signed. The test vector consists of eight text files with a random text of different size, 1 KB, 10 KB, 50 KB, 100 KB, 1 MB, 2 MB, 5 MB, 10 MB. Each file will have the different impact on the processing time, which will be discussed later. The text is random text, as presented in Figure 6.
  • The second step is to choose the processing system and the algorithm for processing the data. The app offers both processing systems: match-off-card using a PC as outside processing system and match-on-card using a national eID biometric card as a processing system. The PC interface implements only the RSA CSP [15] from the NET framework as the only processing algorithm. Whereas the national eID biometric card offers two processing algorithms: RSA [16] and RSA CSP. This comparison is the main experiment conducted in this paper, it measures the processing time of the two processing systems.
  • The third and last step is to choose if the user wants to encrypt or sign the selected data, with the selected algorithm and selected processing system. Each experiment is run 10 times and the results are written in a text file. This text file shows the execution time for each of 10 runs and the best time, worst time and the average time from the experiment.

4. Experimental Results

All the experiments conducted in this paper are done using biometricefficiency_FIEK, as described in Section 3, and its source code is freely available on GitHub.
The first step is to select the size of the text file for the experiment. The user can select between 1 KB, 10 KB, 50 KB, 100 KB, 1 MB, 2 MB, 5 MB and 10 MB. Those files, each will have impact on both processes in different ways, which affect the efficiency or time needed for processing.
The second step, which is the main step is to select the algorithm. By selecting the algorithm, we select also the processing system. The match-off-card implements only RSA CryptoServiceProvider, and the processing is done on a PC. On the other hand, the match-on-card implements two algorithms RSA and RSA CryptoServiceProvider, and the national eID biometric card will be used as the processing system. The main test case in this paper will compare the efficiency of the match-off-card and match-on-card, for different data size, algorithms and processes.
The final step is to choose the process, encryption or signing. Both can be processed on a PC or card and will influence differently the processing time.
As explained above, different parameters will have an impact on the efficiency. All these parameters will be grouped in three test cases. The first test case will compare two NET framework classes RSA and RSA CSP, in the encryption process using match-on-card technology. The second test case will compare the efficiency of the match-off-card and match-on-card processing system in the encryption, using RSA CSP class. The third test case will compare again match-off-card and match-on-card processing system, but now in the signing process, again using the RSA CSP class.

4.1. RSA vs. RSA Crypto Service Provider (CSP)—Encryption with National eID Biometric card

The first experiment will compare the RSA class and RSA Crypto Service Provider class from the NET framework, in the encryption process, using the match-on-card processing system on national eID biometric card.
The experiment will include all test vectors, and for each text file, the experiment will be executed 10 times. This will serve the accuracy of the experiment and will help to generate the average time, best time and worst time of execution.
The experimental results, for all test vectors are shown in Table 1 and graphically in Figure 7.
Two things characterize this experiment. Firstly, as depicted in Figure 7, one can see from the first experiment that more time (expressed in milliseconds) will be spent at the beginning of an experimental cycle. This can be seen especially in the 1 KB and 10 KB experiment, where the processing time is greater in the first cycle. This because the time needed to load the data on the memory, as basic concepts from the memory organization of smart card memory [16]. After that, the time needed for processing is shorter.
The second thing to notice is the change in processing time, when we increase the size of data. The processing time will be increased when we process a larger amount of data, but the class RSA performs better than the class RSA CSP. The difference in processing time increases with each larger data set, as shown in Table 2 and Figure 8.
In this case, we can conclude that the class RSA is more efficient than RSA CSP, especially when we have a large amount of data.

4.2. Personal Compuer (PC) vs. Card—Encryption Using RSA CSP Class

In the second experiment we will compare the two processing systems, match-off-card vs. match-on-card. As stated above, match-off-card processing will be done using a PC, Intel Core i5 5200U CPU 2.20 GHz, 8 GB of RAM, Windows 10 64-bit operating system and using the RSA CSP class from NET framework. However, the match-on-card uses the smart card reader to transfer the information between the national eID biometric smart-card and the PC.
As in the first experiment, this experiment will include all eight text files and the experiment will be executed 10 times for each file. The experimental results for all test vectors are shown in Table 3 and Figure 9.
As with the previous experiment, more time will be needed at the beginning of each experiment, for the same reason as before. PCs also have internal memory, and more time will be needed for data to load and stored there [17].
The main conclusion from this experiment that we can draw is that the processing time increases exponentially with the size of a file, as shown in Table 4 and Figure 10. But, we cannot draw a conclusion as to which processing time is more efficient, since both systems perform roughly the same. So, neither of the match-on-card or match-off-card processing systems performs better and both can be used for encryption of information.

4.3. PC vs. Card—Signing Using RSA CSP Class

The third and last experiment compares again two processing systems, match-off-card vs. match-on-card, using the signing process. We use the same devices, PC for the match-off-card and national eID bio-metric card for match-on-card.
The results of the experiment, for all eight text files and 10 cycles for each file, are shown in Table 5 and Figure 11.
This experiment is very interesting and one can draw few conclusions. Only in the 1 KB test case has the national biometric card performed better than PC. In the other seven text files, the PC has performed better. From Table 6 and Figure 12, we notice that match-off-card processing time increases very little when we increase the size of the test files. This is not the case in the match-on-card processing system, where the processing time increases exponentially when we increase the file size.
So, from this experiment we can conclude that, in the signing process, overall match-on-card is more efficient than a match-off-card, especially for larger files. Match-on-card can still be used, in cases when we have small files to process.
Another form of data representation could be used, especially for representing Figure 8, Figure 10 and Figure 12 using the Weierstrass–Mandelbrot function as in [18,19], which will be future work.

5. Conclusions

Match-on-card and match-off-card are two processing systems used today for security processing. In this paper, match-on-card uses a national biometric card, with very advanced hardware architecture, to process the data, whereas a PC is used as a device in the match-off-card. Between them are many advantages and disadvantages, each playing a significant role when choosing them as the processing device.
As shown within experimental results, there are few cases where, usually when handling a small amount of data, a biometric card has a better performance; even for a very small amount of data, less than 1 kB, the biometric card outperforms the PC, as presented in Figure 12. With an increased amount of data, the performance of the biometric card decreases, as was expected, due to limited hardware resources of the biometric card, as described in Section 2.
Future work will add more functionality to biometricefficiency_FIEK app, such as using elliptic curve algorithms, verifying the digital signature, and adding more encryption algorithms such as the AES.

Author Contributions

G.K., P.R. and B.R. designed the application. P.R. developed the application. G.K. and P.R. conceived and designed the experiments. G.K. performed the experiments; B.R. and P.R. analyzed the data. G.K., P.R. and B.R. wrote the paper.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Biometrics for Payment Applications the SPA Vision on Financial Match-on-Card; Smart Payment Association (SPA): Munich, Germany, November 2013.
  2. Pang, C.T.; Yun, Y.W.; Xudong, J. On-Card Matching. In Encyclopedia of Biometrics; Springer: New York, NY, USA, 2009. [Google Scholar]
  3. Smart Cards and Biometrics. In A Smart Card Alliance Physical Access Council White Paper; Smart Card Alliance: Princeton, NJ, USA, March 2011.
  4. Bringer, J.; Chabanne, H.; Pointcheval, D.; Zimmer, S. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. In Proceedings of the 3rd International Workshop on Security (IWSEC ‘08), Kagawa, Japan, 25–27 November 2008. [Google Scholar]
  5. Grother, P.; Salamon, W.; Watson, C.; Indovina, M.; Flanagan, P. MINEX II Performance of Fingerprint Match-on-Card Algorithms Phase II/III Report—NIST Interagency Report 7477; Information Access Division—National Institute of Standards and Technology: Gaithersburg, MD, USA, 2009. [Google Scholar]
  6. Security and Performance Evaluation Platform of Biometric Match on Card. In Proceedings of the International Conference on Mobile Applications and Security Management (ICMASM), Sousse, Tunisia, 22–24 June 2013.
  7. Cooper, D.; Dang, H.; Lee, P.; MacGregor, W.; Mehta, K. Secure Biometric Match-on-Card Feasibility Report; NIST Interagency Report 7452; National Institute of Standards and Technology: Gaithersburg, MD, USA, November 2007. Available online: https://csrc.nist.gov/publications/detail/nistir/7452/final (accessed on 22 August 2018).
  8. ICAO Doc9303, Machine Readable Travel Documents, 7th ed.; Available online: https://www.icao.int/publications/Documents/9303_p3_cons_en.pdf (accessed on 22 August 2018).
  9. Rexha, B.; Imeraj, D.; Shabani, I. Using efficient TRNGs for PSEUDO profile in national eID card. Int. J. Recent Contrib. Eng. Sci. 2018, 6, 57–73. [Google Scholar] [CrossRef]
  10. I. AG, Technical Details for SLE 78CLX1280P. Available online: http://www.infineon.com/ (accessed on 22 August 2018).
  11. Giesecke & Devrient GmbH. Help files and technical notes for HIGHSEC eID App. Available online: https://mpb.rks-gov.net/eID.html (accessed on 22 August 2018).
  12. Rexha, B.; Qerimi, E.; Neziri, V.; Dervishi, R. Using eID Pseudonymity and Anonmity for Strengthing User Freedom in Internet; Time for a European Internet; Central and Eastern European e|Dem and e|Gov Days 2015 Independence Day: Budapest, Hungary, 2015. [Google Scholar]
  13. Krasniqi, G.; Rama, P.; Rexha, B. Source code of application developed and hosted by GitHub. Available online: https://github.com/petritrama-unipr/BiometricEfficiency_FIEK (accessed on 20 July 2018).
  14. Microsoft. Smart Card Authentication. Available online: https://docs.microsoft.com/en-us/windows/desktop/secauthn/smart-card-authentication (accessed on 22 August 2018).
  15. Microsoft. RSACryptoServiceProvider Class. NET Framework 4.7.2. Available online: https://msdn.microsoft.com/en-us/library/system.security.cryptography.rsacryptoserviceprovider(v=vs.110).aspx (accessed on 20 July 2018).
  16. Rankl, W.; Effing, W. Smart Card Handbook; John Wiley & Sons Ltd.: London, UK, 2003. [Google Scholar]
  17. Stallings, W. Operating Systems: Internals and Design Principles; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2012. [Google Scholar]
  18. Guariglia, E. Entropy and Fractal Antennas. Entropy 2016, 18, 1–17. [Google Scholar] [CrossRef]
  19. Guariglia, E. Spectral Analysis of the Weierstrass-Mandelbrot Function. In Proceedings of the 2nd International Multidisciplinary Conference on Computer and Energy Science, Split, Croatia, 12–14 July 2017. [Google Scholar]
Figure 1. Match-off-card system. Reprinted with permission from [2]. © 2009 Springer US.
Figure 1. Match-off-card system. Reprinted with permission from [2]. © 2009 Springer US.
Asi 01 00037 g001
Figure 2. Match-on-card system. Reprinted with permission from [2]. © 2009 Springer US.
Figure 2. Match-on-card system. Reprinted with permission from [2]. © 2009 Springer US.
Asi 01 00037 g002
Figure 3. National biometric identity (ID) card and hosted apps.
Figure 3. National biometric identity (ID) card and hosted apps.
Asi 01 00037 g003
Figure 4. Smartcard Windows architecture [14].
Figure 4. Smartcard Windows architecture [14].
Asi 01 00037 g004
Figure 5. The interface of BiometricEfficiency_FIEK app.
Figure 5. The interface of BiometricEfficiency_FIEK app.
Asi 01 00037 g005
Figure 6. The 1 KB text file.
Figure 6. The 1 KB text file.
Asi 01 00037 g006
Figure 7. Graphical results of the experiment.
Figure 7. Graphical results of the experiment.
Asi 01 00037 g007
Figure 8. Graphical results of RSA vs. RSA CSP.
Figure 8. Graphical results of RSA vs. RSA CSP.
Asi 01 00037 g008
Figure 9. Graphical results of the experiment.
Figure 9. Graphical results of the experiment.
Asi 01 00037 g009
Figure 10. Average time of PC vs. card.
Figure 10. Average time of PC vs. card.
Asi 01 00037 g010
Figure 11. Graphical results of the experiment for signing RSA vs. card.
Figure 11. Graphical results of the experiment for signing RSA vs. card.
Asi 01 00037 g011
Figure 12. Average time for signing RSA vs. card.
Figure 12. Average time for signing RSA vs. card.
Asi 01 00037 g012
Table 1. Results RSA vs. RSA Crypto Service Provider (CSP).
Table 1. Results RSA vs. RSA Crypto Service Provider (CSP).
Size1 KB10 KB50 KB100 KB1 MB2 MB5 MB10 MB
#.RSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSP
13.222.5313.6518.2649.5866.0390.85127.79868.21235.41622.72466.84050.06553.78100.212,446.0
20.871.8111.4112.5641.2862.3884.34123.08851.61224.21625.22449.44062.86779.28071.212,856.5
30.871.337.8612.9141.0760.5481.37119.40812.71295.11626.72467.24056.16801.48304.112,174.1
40.901.339.2112.3140.4960.3378.67119.22827.21387.71627.02449.34029.96348.88100.712,187.8
50.822.007.8612.3942.0860.5279.90118.92804.61312.51620.02446.64103.86091.38041.112,173.6
60.811.338.4612.2247.4159.4578.41118.89804.61603.81608.92445.54214.86096.68617.112,258.2
71.101.308.0112.2940.3059.6978.44118.77811.61299.41615.82459.84444.26082.78258.513,051.2
80.821.238.4412.2039.2159.5279.38118.88818.61285.91607.62448.74407.96076.68031.812,241.2
90.831.577.9812.3339.2759.77105.83118.90804.71254.91631.42448.44048.46131.08126.512,189.7
100.801.238.2812.3939.3659.80105.19118.83800.81218.11606.32446.74030.36095.18112.312,173.3
Table 2. Average time of RSA vs. RSA CSP.
Table 2. Average time of RSA vs. RSA CSP.
Average Time (ms)
SizeRSARSA CSPDiff
1 KB1.101.5641.72%
10 KB9.1212.9942.45%
50 KB42.0060.8044.76%
100 KB86.24120.2739.46%
1 MB820.461311.7159.88%
2 MB1619.162452.8351.49%
5 MB4144.826305.6452.13%
10 MB8176.3412,375.1751.35%
Table 3. Results of personal computer (PC) vs. card.
Table 3. Results of personal computer (PC) vs. card.
Size1 KB10 KB50 KB100 KB1 MB2 MB5 MB10 MB
#RSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSP
13.162.5312.5518.2660.6766.03120.60127.791217.81235.42479.82466.86603.36553.713,160.612,446.0
21.481.8120.5812.5659.5662.38119.04123.081214.61224.22438.22449.46419.66779.212,201.212,856.5
31.331.3312.1212.9159.6560.54118.85119.401216.31295.12434.12467.26257.36801.412,180.812,174.1
41.291.3312.0712.3168.1560.33119.35119.221216.61387.72440.32449.36359.96348.812,173.612,187.8
51.282.0012.0512.3959.3860.52118.84118.921223.21312.52431.22446.66083.26091.312,155.712,173.6
61.241.3312.5412.2259.5059.45118.75118.891219.81603.82434.72445.56084.86096.612,931.112,258.2
71.251.3012.5712.2959.4559.69118.80118.771220.21299.42434.52459.86126.96082.712,235.513,051.2
81.241.2312.1112.2060.5559.52119.10118.881217.11285.92432.52448.76106.46076.612,215.912,241.2
91.231.5712.0612.3360.7059.77119.27118.901217.01254.92429.72448.46079.76131.012,179.412,189.7
101.231.2311.9912.3959.4459.80118.84118.831217.61218.12517.42446.76076.06095.112,272.712,173.3
Table 4. Average time of PC vs. card.
Table 4. Average time of PC vs. card.
Average Time (ms)
SizePCCardDiff
1 KB1.471.566.20%
10 KB13.0612.99−0.59%
50 KB60.7060.800.16%
100 KB119.14120.270.95%
1 MB1218.031311.717.69%
2 MB2447.242452.830.23%
5 MB6219.726305.641.38%
10 MB12,370.6512,375.170.04%
Table 5. Signing RSA vs. card.
Table 5. Signing RSA vs. card.
Size1 KB10 KB50 KB100 KB1 MB2 MB5 MB10 MB
#RSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSPRSACSP
110.332.387.2417.287.4166.177.88134.8116.31258.821.12448.252.56187.973.612,189.5
27.092.197.2912.747.4162.287.81123.8113.81236.420.62488.648.76125.373.112,153.6
37.102.607.1512.377.8262.157.81120.4213.91249.520.32441.440.16123.773.612,157.3
47.182.677.2211.997.4161.337.74118.8413.81271.720.32429.140.36117.095.612,669.9
57.092.437.2312.497.4962.367.78118.8313.81248.720.32496.640.46119.1100.912,627.0
67.122.227.1512.667.4859.727.81118.8313.81231.721.22679.941.36128.274.812,154.5
77.181.967.2213.407.4059.977.78119.5713.71231.920.42608.841.06117.773.012,160.6
87.631.337.2312.087.9359.547.74118.9913.71233.520.52658.440.66303.173.012,162.9
97.161.337.1512.307.5059.597.86119.1613.71236.420.52549.140.46683.673.112,300.0
107.191.337.1812.727.4659.617.91118.7213.71236.020.42428.740.46241.696.113,158.7
Table 6. Average time for signing PC vs. card.
Table 6. Average time for signing PC vs. card.
Average Time (ms)
SizePCCardDiff
1 KB7.512.04−72.77%
10 KB7.2113.0080.45%
50 KB7.5361.27713.49%
100 KB7.81121.201451.75%
1 MB14.011243.488772.78%
2 MB20.572522.9012,165.59%
5 MB42.566214.7214,500.78%
10 MB80.6812,373.4015,237.16%

Share and Cite

MDPI and ACS Style

Krasniqi, G.; Rama, P.; Rexha, B. Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications. Appl. Syst. Innov. 2018, 1, 37. https://doi.org/10.3390/asi1040037

AMA Style

Krasniqi G, Rama P, Rexha B. Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications. Applied System Innovation. 2018; 1(4):37. https://doi.org/10.3390/asi1040037

Chicago/Turabian Style

Krasniqi, Gazmend, Petrit Rama, and Blerim Rexha. 2018. "Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications" Applied System Innovation 1, no. 4: 37. https://doi.org/10.3390/asi1040037

APA Style

Krasniqi, G., Rama, P., & Rexha, B. (2018). Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications. Applied System Innovation, 1(4), 37. https://doi.org/10.3390/asi1040037

Article Metrics

Back to TopTop