Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

被引:68
作者
Rifa-Pous, Helena [1 ]
Herrera-Joancomarti, Jordi [2 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst, Barcelona 08018, Spain
[2] Univ Autonoma Barcelona, Dept Informat & Commun Engn, Bellaterra 08193, Spain
来源
FUTURE INTERNET | 2011年 / 3卷 / 01期
关键词
ubiquitous networks; performance; time delay; energy; cryptography; ARM architecture;
D O I
10.3390/fi3010031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device.
引用
收藏
页码:31 / 48
页数:18
相关论文
共 23 条
  • [1] Babbage S., 2010, YEARLY REPORT ALGORI
  • [2] Barker E., 2020, NIST SPECIAL PUBLICA
  • [3] Barreto P.S, 2004, 2004305
  • [4] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [5] Short signatures without random oracles and the SDH assumption in bilinear groups
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 149 - 177
  • [6] Branovic I., 2003, ACM SIGARCH WORKSH M, P24
  • [7] Cronin E., 2003, ACM, P131
  • [8] Doomun M. Razvi, 2007, P 3 IEEE INT C CENTR, P1
  • [9] Endrodi C, 2002, TECHNICAL REPORT
  • [10] Grossschadi J, 2007, DES AUT TEST EUROPE, P1110