Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices
In this paper, we evaluated the performance of key exchange protocols on mobile devices. The wide usage of low power mobile phones causes mobile computing to spread rapidly and an increasing number of networked applications are developed for these devices. One important consideration in this scenario is data security. This is particularly important in secure groupware, collaborative or multiuser applications where simultaneous communication with multiple parties must be securely maintained. One key component of building secure data channels are computationally expensive key exchange protocols. Based on the benchmark of several asymmetric algorithms on mobile phones, we theoretically analyzed the speed of authenticated multiparty key agreement protocols with different designs and compared them with each other. The results were confirmed by a protocol benchmark in our testbed.
Unable to display preview. Download preview PDF.
- 2.D. Boneh et al., Generating RSA Keys on a Handheld Using an Untrusted Server. RSA 2000Google Scholar
- 3.Yu Lei, Deren Chen, Zhongding Jiang, Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications, AINA 2004. Volume 2, 29-31, pp. 532–535, 2004Google Scholar
- 4.V. S. Miller, Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO, LNCS, Volume 218, pp. 417–426, 1985Google Scholar
- 6.Arjen K. Lenstra and Eric R. Verheul, The XTR Public Key System. Lecture Notes in Computer Science, Volume 1880, 2000Google Scholar
- 7.H. Harney and C. Muckenhirn, RFC 2093: Group Key Manag. Protocol (GKMP) Specification. Network Working Group, 1997Google Scholar
- 8.M. Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communication. Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37, 1996Google Scholar
- 9.M. Burmester and Y. Desmedt, A Secure and Efficient Conference Key Distribution System. In Proceedings of Eurocrypt 1994, pp. 275–286, 1994Google Scholar
- 10.M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement. Proceedings of the Int. Conference on the Theory and Applications of Cryptology and Inf. Security: Advances in Cryptology, pp. 36–49, 1996Google Scholar
- 11.E. Bresson et al., Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. 5th IEEE MWCN, 2003Google Scholar
- 12.Y. Kim et al., Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244, 2000Google Scholar
- 13.M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. SAC '05, pp. 324–331, 2005Google Scholar
- 14.C. Popescu, A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications, Volume 27, 2005Google Scholar