Abstract
In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This paper compared two (2) cryptographic mechanisms, the RSA-AES and the AES-EAX PSK which provide end-to-end security for SMS-based transmission. We implemented these two (2) mechanisms assuming the constraints of standard SMS network and measured their performance in terms of transaction time. Our study indicated that in terms of processing time, the Authenticated Encryption and Associate Data (AEAD) modes represented by EAX performed better even when the digital signature of the Public Key Infrastructure (PKI) mode represented by RSA was not included.
This work was supported by the Department of Information Systems and Computer Science of the Ateneo de Manila University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
SMS (Short Message Service), http://www.gsmworld.com/yechnology/sms
Information Technology-Security Techniques-Code of Practice for Information Security Management, geneva (2005)
SMS is top service for Asian mobile phone users (March 2006)
Botan cryptography library (2010), http://botan.randombit.net/
Python Programming Language (2010), http://www.python.org/
3rd Generation Partnership Project: GSM 03.40: Digital cellular telecommunications system (Phase 2+). Technical Realization of the Short Message Service, SMS (2001)
Moh’d, A., Nauman Aslam, H.M.L.T.: Hardware Implementations of Secure Hashing Functions on FPGAs for WSNs. Journal of Networking Technology 1(1), 1–43 (2010)
Barkan, E., Eli, B.: Conditional Estimators: An Effective Attack on A5/1, pp. 1–19 (2005)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469–491 (2008)
Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389–407. Springer, Heidelberg (2004)
Bellare, M.N.C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469–491 (2008)
Biham, E., Orr, D.: Cryptanalysis of the A5/1 GSM Stream Cipher, 43–51 (2000)
Biham, E., Orr, D.: Cryptanalysis of the A5/1 GSM Stream Cipher. Indocrypt (2000)
Biryukov, A., Adi, S., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. Encryption-FSE, 1–18 (2000)
Dye, M.S.: End-to-End M2M (Sample/Excerpts Copy only - Not Full Report).
Ekdahl, P., Thomas, J.: Another attack on A5/1. IEEE Transactions On Information Theory 49(1), 284–289 (2003)
Elad, B., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion, Full Version (2006)
Elgamal, T., Hickman, K.: Secure socket layer application program apparatus and method. US Patent 5, 390–657 (1997)
Lo, J., Binshop, J., Eloff, J.: SMSSec: an end-to-end protocol for secure SMS. Computers and Security 27(5–6), 154–167 (2008)
LORD, S.: Trouble at Telco: When GSM Goes Bad. 1, 10–12 (2003)
Lucero, S.: Maximizing Mobile Operator Opportunities in M2M (2010)
Patrik, E., Johansson, T.: Another attack on A5/1. IEEE Transactions on Information Theory 49(1), 284–289 (2003) doi:10.1109/TIT.2002.806129
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (1978)
Schmidt, M.: Consistent M-Commerce Security on Top of GSM-based Data Protocols-A security Analysis (2001)
Yu, W.: New Botan, the C++ Crypto Library, built for Fedora 13 with Python Bindings Enabled and the RSA-PrivateKey fix (August 2010), http://hip2b2.yutivo.org/2010/08/23/botan-patch/
Yu, W., Tagle, P.: Development of an Over-the-Top Network Protocol for Pervasive, Secure and Reliable Data Transmission over GSM Short Messaging Service. In: To be presented at the 2010 International Conference on Computer and Software Modeling (ICCSM 2010),IACSIT (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Yu, W.E. (2011). Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. In: Fong, S. (eds) Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, vol 136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22185-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-22185-9_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22184-2
Online ISBN: 978-3-642-22185-9
eBook Packages: Computer ScienceComputer Science (R0)