Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

A. Murat Fiskiran, R. B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Abstract

In recent years, some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environments like mobile information appliances, where computing resources and power availability are limited. In this paper, we select a set of public-key, symmetric-key and hash algorithms suitable for such environments and study their workload characteristics. In particular, we study elliptic-curve versions of public-key cryptography algorithms, which allow fast software implementations while reducing the key size needed for a desired level of security compared to previous integer-based public-key algorithms. We characterize the operations needed by elliptic-curve analogs of Diffie-Hellman key exchange, ElGamal and the Digital Signature Algorithm for public-key cryptography, for different key sizes and different levels of software optimization. We also include characterizations for the Advanced Encryption Standard (AES) for symmetric-key cryptography, and SHA as a hash algorithm. We show that all these algorithms can be implemented efficiently with a very simple processor.

Original languageEnglish (US)
Title of host publication2002 IEEE International Workshop on Workload Characterization, WWC 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages127-137
Number of pages11
ISBN (Electronic)0780376811, 9780780376816
DOIs
StatePublished - Jan 1 2002
EventIEEE International Workshop on Workload Characterization, WWC 2002 - Austin, United States
Duration: Nov 25 2002 → …

Publication series

Name2002 IEEE International Workshop on Workload Characterization, WWC 2002

Other

OtherIEEE International Workshop on Workload Characterization, WWC 2002
CountryUnited States
CityAustin
Period11/25/02 → …

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments'. Together they form a unique fingerprint.

  • Cite this

    Murat Fiskiran, A., & Lee, R. B. (2002). Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments. In 2002 IEEE International Workshop on Workload Characterization, WWC 2002 (pp. 127-137). [1226501] (2002 IEEE International Workshop on Workload Characterization, WWC 2002). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WWC.2002.1226501