Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices

  • Tobias Limmer
  • Falko Dressler
  • Ruben Gonzalez
Part of the Informatik aktuell book series (INFORMAT)


In this paper, we evaluated the performance of key exchange protocols on mobile devices. The wide usage of low power mobile phones causes mobile computing to spread rapidly and an increasing number of networked applications are developed for these devices. One important consideration in this scenario is data security. This is particularly important in secure groupware, collaborative or multiuser applications where simultaneous communication with multiple parties must be securely maintained. One key component of building secure data channels are computationally expensive key exchange protocols. Based on the benchmark of several asymmetric algorithms on mobile phones, we theoretically analyzed the speed of authenticated multiparty key agreement protocols with different designs and compared them with each other. The results were confirmed by a protocol benchmark in our testbed.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM archive, Volume 21, Issue 2, pp. 120–126, 1978zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    D. Boneh et al., Generating RSA Keys on a Handheld Using an Untrusted Server. RSA 2000Google Scholar
  3. 3.
    Yu Lei, Deren Chen, Zhongding Jiang, Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications, AINA 2004. Volume 2, 29-31, pp. 532–535, 2004Google Scholar
  4. 4.
    V. S. Miller, Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO, LNCS, Volume 218, pp. 417–426, 1985Google Scholar
  5. 5.
    N. Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation, Volume 48, pp. 203–209, 1987zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Arjen K. Lenstra and Eric R. Verheul, The XTR Public Key System. Lecture Notes in Computer Science, Volume 1880, 2000Google Scholar
  7. 7.
    H. Harney and C. Muckenhirn, RFC 2093: Group Key Manag. Protocol (GKMP) Specification. Network Working Group, 1997Google Scholar
  8. 8.
    M. Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communication. Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37, 1996Google Scholar
  9. 9.
    M. Burmester and Y. Desmedt, A Secure and Efficient Conference Key Distribution System. In Proceedings of Eurocrypt 1994, pp. 275–286, 1994Google Scholar
  10. 10.
    M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement. Proceedings of the Int. Conference on the Theory and Applications of Cryptology and Inf. Security: Advances in Cryptology, pp. 36–49, 1996Google Scholar
  11. 11.
    E. Bresson et al., Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. 5th IEEE MWCN, 2003Google Scholar
  12. 12.
    Y. Kim et al., Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244, 2000Google Scholar
  13. 13.
    M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. SAC '05, pp. 324–331, 2005Google Scholar
  14. 14.
    C. Popescu, A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications, Volume 27, 2005Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tobias Limmer
    • 1
  • Falko Dressler
    • 1
  • Ruben Gonzalez
    • 2
  1. 1.Department of Computer ScienceUniversity of ErlangenGermany
  2. 2.Faculty of Engineering and Information TechnologyGriffith UniversityAustralia

Personalised recommendations