Skip to main content

Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions

  • Conference paper
Networked Digital Technologies (NDT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 136))

Included in the following conference series:

Abstract

In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This paper compared two (2) cryptographic mechanisms, the RSA-AES and the AES-EAX PSK which provide end-to-end security for SMS-based transmission. We implemented these two (2) mechanisms assuming the constraints of standard SMS network and measured their performance in terms of transaction time. Our study indicated that in terms of processing time, the Authenticated Encryption and Associate Data (AEAD) modes represented by EAX performed better even when the digital signature of the Public Key Infrastructure (PKI) mode represented by RSA was not included.

This work was supported by the Department of Information Systems and Computer Science of the Ateneo de Manila University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. SMS (Short Message Service), http://www.gsmworld.com/yechnology/sms

  2. Information Technology-Security Techniques-Code of Practice for Information Security Management, geneva (2005)

    Google Scholar 

  3. SMS is top service for Asian mobile phone users (March 2006)

    Google Scholar 

  4. Botan cryptography library (2010), http://botan.randombit.net/

  5. Python Programming Language (2010), http://www.python.org/

  6. 3rd Generation Partnership Project: GSM 03.40: Digital cellular telecommunications system (Phase 2+). Technical Realization of the Short Message Service, SMS (2001)

    Google Scholar 

  7. Moh’d, A., Nauman Aslam, H.M.L.T.: Hardware Implementations of Secure Hashing Functions on FPGAs for WSNs. Journal of Networking Technology 1(1), 1–43 (2010)

    Google Scholar 

  8. Barkan, E., Eli, B.: Conditional Estimators: An Effective Attack on A5/1, pp. 1–19 (2005)

    Google Scholar 

  9. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469–491 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  10. Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389–407. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Bellare, M.N.C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469–491 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  12. Biham, E., Orr, D.: Cryptanalysis of the A5/1 GSM Stream Cipher, 43–51 (2000)

    Google Scholar 

  13. Biham, E., Orr, D.: Cryptanalysis of the A5/1 GSM Stream Cipher. Indocrypt (2000)

    Google Scholar 

  14. Biryukov, A., Adi, S., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. Encryption-FSE, 1–18 (2000)

    Google Scholar 

  15. Dye, M.S.: End-to-End M2M (Sample/Excerpts Copy only - Not Full Report).

    Google Scholar 

  16. Ekdahl, P., Thomas, J.: Another attack on A5/1. IEEE Transactions On Information Theory 49(1), 284–289 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  17. Elad, B., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion, Full Version (2006)

    Google Scholar 

  18. Elgamal, T., Hickman, K.: Secure socket layer application program apparatus and method. US Patent 5, 390–657 (1997)

    Google Scholar 

  19. Lo, J., Binshop, J., Eloff, J.: SMSSec: an end-to-end protocol for secure SMS. Computers and Security 27(5–6), 154–167 (2008)

    Article  Google Scholar 

  20. LORD, S.: Trouble at Telco: When GSM Goes Bad. 1, 10–12 (2003)

    Google Scholar 

  21. Lucero, S.: Maximizing Mobile Operator Opportunities in M2M (2010)

    Google Scholar 

  22. Patrik, E., Johansson, T.: Another attack on A5/1. IEEE Transactions on Information Theory 49(1), 284–289 (2003) doi:10.1109/TIT.2002.806129

    Article  MathSciNet  MATH  Google Scholar 

  23. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (1978)

    Google Scholar 

  24. Schmidt, M.: Consistent M-Commerce Security on Top of GSM-based Data Protocols-A security Analysis (2001)

    Google Scholar 

  25. Yu, W.: New Botan, the C++ Crypto Library, built for Fedora 13 with Python Bindings Enabled and the RSA-PrivateKey fix (August 2010), http://hip2b2.yutivo.org/2010/08/23/botan-patch/

  26. Yu, W., Tagle, P.: Development of an Over-the-Top Network Protocol for Pervasive, Secure and Reliable Data Transmission over GSM Short Messaging Service. In: To be presented at the 2010 International Conference on Computer and Software Modeling (ICCSM 2010),IACSIT (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Yu, W.E. (2011). Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. In: Fong, S. (eds) Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, vol 136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22185-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22185-9_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22184-2

  • Online ISBN: 978-3-642-22185-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics