{"title":"在嵌入式设备中实现基于身份的密钥协议","authors":"G. Schmid, F. Rossi","doi":"10.5220/0005242901170123","DOIUrl":null,"url":null,"abstract":"In recent years, a substantial work has been devoted to the design of cryptographic protocols with reduced computational load and power consumption. However, implementations are scarce, especially in case of embedded devices. In this paper, we discuss the implementation over elliptic curves of a two-party key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. Our implementation takes advantage of the portability and security features of the Java programming language and, due to a modular design, it can be easily extended to encompass other identity-based schemes and protocols. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time. Our results demonstrate that getting secure communications using low cost, resource constrained devices is viable to the point that it can be used for real world applications.","PeriodicalId":345016,"journal":{"name":"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementing identity-based key agreement in embedded devices\",\"authors\":\"G. Schmid, F. Rossi\",\"doi\":\"10.5220/0005242901170123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, a substantial work has been devoted to the design of cryptographic protocols with reduced computational load and power consumption. However, implementations are scarce, especially in case of embedded devices. In this paper, we discuss the implementation over elliptic curves of a two-party key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. Our implementation takes advantage of the portability and security features of the Java programming language and, due to a modular design, it can be easily extended to encompass other identity-based schemes and protocols. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time. Our results demonstrate that getting secure communications using low cost, resource constrained devices is viable to the point that it can be used for real world applications.\",\"PeriodicalId\":345016,\"journal\":{\"name\":\"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0005242901170123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0005242901170123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementing identity-based key agreement in embedded devices
In recent years, a substantial work has been devoted to the design of cryptographic protocols with reduced computational load and power consumption. However, implementations are scarce, especially in case of embedded devices. In this paper, we discuss the implementation over elliptic curves of a two-party key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. Our implementation takes advantage of the portability and security features of the Java programming language and, due to a modular design, it can be easily extended to encompass other identity-based schemes and protocols. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time. Our results demonstrate that getting secure communications using low cost, resource constrained devices is viable to the point that it can be used for real world applications.