Abstract
In this paper, we evaluated the performance of key exchange protocols on mobile devices. The wide usage of low power mobile phones causes mobile computing to spread rapidly and an increasing number of networked applications are developed for these devices. One important consideration in this scenario is data security. This is particularly important in secure groupware, collaborative or multiuser applications where simultaneous communication with multiple parties must be securely maintained. One key component of building secure data channels are computationally expensive key exchange protocols. Based on the benchmark of several asymmetric algorithms on mobile phones, we theoretically analyzed the speed of authenticated multiparty key agreement protocols with different designs and compared them with each other. The results were confirmed by a protocol benchmark in our testbed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM archive, Volume 21, Issue 2, pp. 120–126, 1978
D. Boneh et al., Generating RSA Keys on a Handheld Using an Untrusted Server. RSA 2000
Yu Lei, Deren Chen, Zhongding Jiang, Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications, AINA 2004. Volume 2, 29-31, pp. 532–535, 2004
V. S. Miller, Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO, LNCS, Volume 218, pp. 417–426, 1985
N. Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation, Volume 48, pp. 203–209, 1987
Arjen K. Lenstra and Eric R. Verheul, The XTR Public Key System. Lecture Notes in Computer Science, Volume 1880, 2000
H. Harney and C. Muckenhirn, RFC 2093: Group Key Manag. Protocol (GKMP) Specification. Network Working Group, 1997
M. Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communication. Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37, 1996
M. Burmester and Y. Desmedt, A Secure and Efficient Conference Key Distribution System. In Proceedings of Eurocrypt 1994, pp. 275–286, 1994
M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement. Proceedings of the Int. Conference on the Theory and Applications of Cryptology and Inf. Security: Advances in Cryptology, pp. 36–49, 1996
E. Bresson et al., Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. 5th IEEE MWCN, 2003
Y. Kim et al., Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244, 2000
M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. SAC '05, pp. 324–331, 2005
C. Popescu, A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications, Volume 27, 2005
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Limmer, T., Dressler, F., Gonzalez, R. (2006). Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices. In: Holleczek, P., Vogel-Heuser, B. (eds) Echtzeitsysteme im Alltag. Informatik aktuell. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68217-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-68217-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47690-0
Online ISBN: 978-3-540-68217-2
eBook Packages: Computer Science and Engineering (German Language)