DSA vs. RSA Encryption - Which Works Best for File Transfers?

DSA and RSA are critical algorithms used in secure file transfers, with RSA suited for both encryption and signing, while DSA was initially designed for signing but now also supports encryption. RSA encrypts faster, making it ideal for client-side efficiency, whereas DSA is faster at decrypting and signing, which is beneficial for server-side performance. Choose based on where computational resources need optimization.
  1. Blog

Overview: DSA vs. RSA

During the process of generating server keys, client keys, or PGP keys in the JSCAPE MFT Server Manager, you're asked to choose between two supported key algorithms: RSA or DSA. Which one should you choose?

dsa vs rsa

The purpose of server, client, and PGP keys

Maybe I should start by explaining very briefly what these keys are for. When you generate a server, client, or PGP "key," you are generating public and private keys.

Private keys are for decrypting and signing, while public keys are for encrypting and verifying.

When you generate a server key, the resulting public/private key pair will be used for encryption and decryption purposes during secure file transfers like FTPS, SFTP, and HTTPS. The public key will be used to encrypt the files at the client side and the private key will be used to decrypt those files when they arrive at the server.

encrypted file transfer

On the other hand, the resulting public/private key pair of a client key generation will be used for signing and verification(a.k.a. authentication) purposes at the start of secure file transfers. For example, at the start of an SFTP session, the user can use his private key to "sign" on the client side. The managed file transfer server will then use the corresponding public key stored on the server side to verify the digital signature and, consequently, the user's identity.

public key authentication for encrypted file transfer

The public/private key pair that results from a PGP key generation is more versatile, for it is used for both encryption & decryption as well as in signing & verification.

If you want a more detailed discussion on server and client keys, I encourage you to read the article "Roles of Server and Client Keys in Secure File Transfers."

DSA vs. RSA - What are they best suited for?

Now it's time to talk about DSA vs. RSA algorithms.

Before I proceed, I'd like to point out that, given equal key lengths, the cryptographic strengths of these two algorithms are just about the same. So if the strength of your encryption is all that matters to you, then there's no need to read the rest of this article. You can pick a key algorithm randomly if you want.

However, if performance is an issue (maybe because you're using old machines or you have thousands of users simultaneously doing secure file transfers) and there's a need to eke out computing resources, read on.

Although their acronyms make it appear that they are very much related, the SA in DSA and the SA in RSA actually don't mean the same thing. RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman, the people who designed this encryption algorithm. DSA, on the other hand, stands for Digital Signature Algorithm.

The meaning of DSA should give you an idea of what it is for (or, to be more accurate, what it was initially designed for). As its name implies, DSA was originally intended only for signing. But now, it can be used for encrypting as well. RSA, on the other hand, has long been used for both encryption and signing.

Here are some performance-related facts about RSA and DSA:

  • Faster at generating keys: DSA

  • Faster at encrypting: RSA

  • Faster at decrypting: DSA

  • Faster at generating a digital signature or "signing": DSA

  • Faster at verifying a digital signature: RSA

Note that "faster" also means "less demanding on computational resources".

Now, let me try and put in my 2 cents worth based on those facts.

Let's start with the key generation. It's generally faster to generate DSA keys. But then, key generation is usually only done once for server keys and once per user for client keys. So I don't really count this as a big point against RSA even if we only want to make comparisons based on performance.

Which one to use for Server Keys

Server keys are used for encryption/decryption. Encryption is done on the client, while decryption is done on the managed file transfer server. But then RSA encrypts faster, while DSA decrypts faster. So, how do we go about this?

Well, if the machines on which your file transfer clients run are mostly slow, while your server is powerful, then it's on the client side where you'll need to eke out computational resources. So in this particular case, you would need server keys with smaller computational encryption requirements. Thus, you would need to use RSA.

However, if your server is slow, you would need server keys with smaller computational requirements for decryption. Meaning, you will want to use DSA.

Note, however, that the public/private keys are only used to encrypt/decrypt the session key at the start of a secure file transfer session. The session key (a symmetric key) is used to encrypt/decrypt files as they are transmitted between the server and client during the entire duration of the file transfer session. Thus, the difference in encryption/decryption speeds between RSA and DSA will only have an impact at the start of a session.

Which one to use for Client Keys

Again, remember that client keys are used for authentication (e.g., public key authentication). Signing is done on the client side, and verification is done on the server side. Since DSA is faster at signing and RSA is faster at verifying, we can use the same arguments we used for server keys.

If your performance issues are more pronounced on the client side, then use DSA. But if your performance issues are on the server side, then use RSA. Another thing to consider is that DSA-generated signatures are significantly smaller. Thus, you might want to use DSA if you've got limited bandwidth.

Like encryption and decryption, signing and verification are only done at the start of a session.

Which one to use for PGP Keys

In the JSCAPE MFT Server, PGP keys are often used with triggers and just stored on the server. As a result, all of the processing (whether for encryption/decryption or signing/verification) is done on the server side. Since RSA and DSA each have their own strengths in this scenario, it's practically a toss-up between the two.

DSA vs. RSA Encryption Summary

Although DSA and RSA have practically the same cryptographic strengths, each has its own advantages when it comes to performance. DSA is faster at decrypting and signing, while RSA is faster at encrypting and verifying. So if you often encounter performance issues, it might be a good idea to look at where the problem lies (i.e., whether it's client-based or server-based) and base your choice of key algorithm on that.

Ready to see how these encryption algorithms can be optimized for your file transfer processes? Book a demo with us today and discover how the JSCAPE MFT Server can secure your data transfers with the right encryption strategy.

Still haven't tried JSCAPE Managed File Transfer Server?Get access -- Request Trial

JSCAPE MFT Server has a FREE, fully functional evaluation edition, which you can download. 
Request a free trial so you can get access.