Skip to main content

Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices

  • Conference paper
Echtzeitsysteme im Alltag

Part of the book series: Informatik aktuell ((INFORMAT))

Abstract

In this paper, we evaluated the performance of key exchange protocols on mobile devices. The wide usage of low power mobile phones causes mobile computing to spread rapidly and an increasing number of networked applications are developed for these devices. One important consideration in this scenario is data security. This is particularly important in secure groupware, collaborative or multiuser applications where simultaneous communication with multiple parties must be securely maintained. One key component of building secure data channels are computationally expensive key exchange protocols. Based on the benchmark of several asymmetric algorithms on mobile phones, we theoretically analyzed the speed of authenticated multiparty key agreement protocols with different designs and compared them with each other. The results were confirmed by a protocol benchmark in our testbed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM archive, Volume 21, Issue 2, pp. 120–126, 1978

    Article  MATH  MathSciNet  Google Scholar 

  2. D. Boneh et al., Generating RSA Keys on a Handheld Using an Untrusted Server. RSA 2000

    Google Scholar 

  3. Yu Lei, Deren Chen, Zhongding Jiang, Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications, AINA 2004. Volume 2, 29-31, pp. 532–535, 2004

    Google Scholar 

  4. V. S. Miller, Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO, LNCS, Volume 218, pp. 417–426, 1985

    Google Scholar 

  5. N. Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation, Volume 48, pp. 203–209, 1987

    Article  MATH  MathSciNet  Google Scholar 

  6. Arjen K. Lenstra and Eric R. Verheul, The XTR Public Key System. Lecture Notes in Computer Science, Volume 1880, 2000

    Google Scholar 

  7. H. Harney and C. Muckenhirn, RFC 2093: Group Key Manag. Protocol (GKMP) Specification. Network Working Group, 1997

    Google Scholar 

  8. M. Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communication. Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37, 1996

    Google Scholar 

  9. M. Burmester and Y. Desmedt, A Secure and Efficient Conference Key Distribution System. In Proceedings of Eurocrypt 1994, pp. 275–286, 1994

    Google Scholar 

  10. M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement. Proceedings of the Int. Conference on the Theory and Applications of Cryptology and Inf. Security: Advances in Cryptology, pp. 36–49, 1996

    Google Scholar 

  11. E. Bresson et al., Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. 5th IEEE MWCN, 2003

    Google Scholar 

  12. Y. Kim et al., Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244, 2000

    Google Scholar 

  13. M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. SAC '05, pp. 324–331, 2005

    Google Scholar 

  14. C. Popescu, A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications, Volume 27, 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Limmer, T., Dressler, F., Gonzalez, R. (2006). Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices. In: Holleczek, P., Vogel-Heuser, B. (eds) Echtzeitsysteme im Alltag. Informatik aktuell. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68217-2_9

Download citation

Publish with us

Policies and ethics