Memory Performance of Public-Key Cryptography Methods in Mobile Environments
نویسندگان
چکیده
As an increasing number of Internet hosts are wireless, handheld devices with small memory and strict CPU-latency constraints, the performance of cryptography methods has become critical for high transaction throughput. Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security level as the standard methods. The memory performance of ECC algorithms was scarcely investigated. We have developed a set of kernel benchmarks to examine performance of standard and corresponding elliptic curve public-key methods. In this paper, we characterize the operations and their memory impact on performance in Diffie-Hellman key exchange, digital signature algorithm, ElGamal, and RSA publickey cryptosystem, as well as elliptic curve DiffieHellman key exchange, elliptic curve digital signature algorithm and elliptic curve El-Gamal algorithm. We modeled a typical mobile device based on the Intel XScale architecture, which utilizes an ARM processor core and studied the benchmark set on that target. Different possible variations for the memory hierarchy of such basic architecture were considered. We compared our benchmarks with MiBench/Security, another widely accepted benchmark set, in order to provide a reference for our evaluation.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملPerformance Scaling of Cryptography Operations in Servers and Mobile Clients
Cryptography algorithms are essential building blocks used to provide security on public communication networks such as the Internet. Concurrent with the increases in wireless connectivity and data rates, security protocols have been expanded over the past years to include more resource-friendly cryptography algorithms such as Elliptic Curve Cryptography (ECC). In this paper, we first describe ...
متن کاملEfficient Authentication Protocols for Mobile Hand-held Devices with Minimum Power Consumption
Mobile phone in day-to-day life has become an important communication device, subjected from formal and informal talks to sharing important and secure information. These secure information falls from personal communication to large business deals. Hence, there is a necessity to ensure security to the applications that are used to transfer confidential information. In order to satisfy the users’...
متن کاملWalnut Digital Signature AlgorithmTM: A lightweight, quantum-resistant signature scheme for use in passive, low-power, and IoT devices
Historically “Lightweight Cryptography” has focused on symmetric schemes, yet asymmetric methods can also work effectively in these environments. Specifically, the Walnut Digital Signature Algorithm (WalnutDSA) provides a public-key signature scheme that verifies signatures significantly faster than ECC in both software and hardware, even in small, constrained environments and is resistant to a...
متن کاملAn Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003