## Towards acceptable public-key encryption in sensor networks (2005)

### Cached

### Download Links

- [doc.tm.uka.de]
- [doc.tm.uka.de]
- [telematics.tm.kit.edu]
- DBLP

### Other Repositories/Bibliography

Venue: | in The 2nd International Workshop on Ubiquitous Computing (ACM SIGMIS |

Citations: | 21 - 0 self |

### BibTeX

@INPROCEEDINGS{Blaß05towardsacceptable,

author = {Erik-oliver Blaß and Martina Zitterbart},

title = {Towards acceptable public-key encryption in sensor networks},

booktitle = {in The 2nd International Workshop on Ubiquitous Computing (ACM SIGMIS},

year = {2005},

pages = {88--93}

}

### OpenURL

### Abstract

Abstract. One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2[15] platform. To our knowledge this implementation is the first to offer acceptable encryption speed while providing adequate security in sensor networks. 1

### Citations

2966 | Hellman: New Directions in Cryptography
- Diffie, Martin
- 1976
(Show Context)
Citation Context ...he design of new security protocols utilizing public-key techniques even for sensor networks. Hereby our implementation is focused on elliptic curve cryptography (ECC). Algorithms like Diffie-Hellman =-=[2]-=-, El-Gamal [13], DSA [14] based on ECC offer the same security than traditional based algorithms but consume a lot less of memory and computing power [8]. As an example: RSA with a key size of 622 Bit... |

781 |
Elliptic curve cryptosystems
- Koblitz
- 1987
(Show Context)
Citation Context ... computing and battery time has to be spent, which surely is not affordable. 3 Elliptic Curve Cryptography Elliptic curves are an algebraic structure whose use for cryptography was first mentioned in =-=[9]-=-. They feature properties which allow the setup of a problem similar to the well known discrete logarithm problem of finite (Galois) fields. An elliptic curve K is a set points over a field that satis... |

332 |
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Gamal
- 1985
(Show Context)
Citation Context ...ew security protocols utilizing public-key techniques even for sensor networks. Hereby our implementation is focused on elliptic curve cryptography (ECC). Algorithms like Diffie-Hellman [2], El-Gamal =-=[13]-=-, DSA [14] based on ECC offer the same security than traditional based algorithms but consume a lot less of memory and computing power [8]. As an example: RSA with a key size of 622 Bits offers the sa... |

277 | Selecting cryptographic key sizes
- Lenstra, Verheul
- 2001
(Show Context)
Citation Context ...tography (ECC). Algorithms like Diffie-Hellman [2], El-Gamal [13], DSA [14] based on ECC offer the same security than traditional based algorithms but consume a lot less of memory and computing power =-=[8]-=-. As an example: RSA with a key size of 622 Bits offers the same security against attacks as an elliptic curve with only 105 Bit key size while consuming a lot more computing time and memory. This is ... |

252 | Talking to strangers: authentication in ad-hoc wireless networks
- Balfanz, Smetters, et al.
- 2002
(Show Context)
Citation Context ...ardware exits there is apparently the need to look for alternatives. Publications like [12] mimic asymmetric signatures schemes by a relatively complex scheme of two party hash chains, so do [10] and =-=[11]-=-. Other works like [4] try to establish pairwise secret keys to avoid public and private key schemes or Diffie-Hellman like key exchanges. In [5] and [6] the authors implement elliptic curve cryptogra... |

210 | A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
- Malan, Welsh, et al.
- 2004
(Show Context)
Citation Context ... is also based on very special Galois fields called optimal extension fields where field multiplication can be done quite efficiently but the security of this idea is yet to be proven. The authors of =-=[1]-=- try to implement elliptic curves on 8 Bit ATMEGA128 chips but reach poor results: for a signature generation over 1:08min of expensive computing and battery time has to be spent, which surely is not ... |

64 | A new family of authentication protocols
- Anderson, Bergadano, et al.
- 1998
(Show Context)
Citation Context ...lated work As no satisfying implementation of efficient asymmetric cryptography on microcontroller based sensor hardware exits there is apparently the need to look for alternatives. Publications like =-=[12]-=- mimic asymmetric signatures schemes by a relatively complex scheme of two party hash chains, so do [10] and [11]. Other works like [4] try to establish pairwise secret keys to avoid public and privat... |

54 |
Establishing Pairwise Keys
- Liu, Ning
- 2003
(Show Context)
Citation Context ...apparently the need to look for alternatives. Publications like [12] mimic asymmetric signatures schemes by a relatively complex scheme of two party hash chains, so do [10] and [11]. Other works like =-=[4]-=- try to establish pairwise secret keys to avoid public and private key schemes or Diffie-Hellman like key exchanges. In [5] and [6] the authors implement elliptic curve cryptography for sensor network... |

36 | Fast Authenticated Key Establishment Protocol for Self Organizing Sensor Network
- Huang, Cukier, et al.
- 2003
(Show Context)
Citation Context ...mplex scheme of two party hash chains, so do [10] and [11]. Other works like [4] try to establish pairwise secret keys to avoid public and private key schemes or Diffie-Hellman like key exchanges. In =-=[5]-=- and [6] the authors implement elliptic curve cryptography for sensor networks. However the underlying hardware is quite sophisticated consisting of 16 Bit microcontrollers with 16 MHz clock frequency... |

16 | Identity Certified Authentication for Ad-hoc Networks
- Weimerskirch, Westhoff
(Show Context)
Citation Context ... sensor hardware exits there is apparently the need to look for alternatives. Publications like [12] mimic asymmetric signatures schemes by a relatively complex scheme of two party hash chains, so do =-=[10]-=- and [11]. Other works like [4] try to establish pairwise secret keys to avoid public and private key schemes or Diffie-Hellman like key exchanges. In [5] and [6] the authors implement elliptic curve ... |

10 | Embedded End-to-End Wireless Security with ECDH Key Exchange
- Kumar, Girimondo, et al.
- 2003
(Show Context)
Citation Context ... consisting of 16 Bit microcontrollers with 16 MHz clock frequency. Therefore the results are only of limited value as typical sensor hardware does not dispose of such powerful computing resource. In =-=[3]-=- a high-performance microcontroller offerings 24 MIPS, i.e. 3 times more than the usual ATMEGA 128, is utilized. The work is also based on very special Galois fields called optimal extension fields wh... |

3 |
Energy/Security Scalable Mobile Cryptosystem
- Huang, Kobayashi, et al.
- 2003
(Show Context)
Citation Context ...heme of two party hash chains, so do [10] and [11]. Other works like [4] try to establish pairwise secret keys to avoid public and private key schemes or Diffie-Hellman like key exchanges. In [5] and =-=[6]-=- the authors implement elliptic curve cryptography for sensor networks. However the underlying hardware is quite sophisticated consisting of 16 Bit microcontrollers with 16 MHz clock frequency. Theref... |