A study of the energy consumption characteristics of cryptographic algorithms and security protocols

被引:244
|
作者
Potlapally, NR [1 ]
Ravi, S
Raghunathan, A
Jha, NK
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
3DES; AES; cryptographic algorithms; DES; Diffie-Hellman; DSA; ECC; embedded system; energy analysis; handheld; low-power; RSA; security; security protocols; SSL;
D O I
10.1109/TMC.2006.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices - battery life - and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level ( such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level ( cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.
引用
收藏
页码:128 / 143
页数:16
相关论文
共 50 条
  • [1] Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms
    Duta, Cristina-Loredana
    Mocanu, Bogdan-Costel
    Vladescu, Florin-Alexandru
    Gheorghe, Laura
    Tapus, Nicolae
    [J]. CONTROL ENGINEERING AND APPLIED INFORMATICS, 2015, 17 (03): : 77 - 87
  • [2] Energy Consumption of Cryptographic Algorithms in Mobile Devices
    Toldinas, J.
    Damasevicius, R.
    Venckauskas, A.
    Blazauskas, T.
    Ceponis, J.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (05) : 158 - 161
  • [3] Analyzing the energy consumption of security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, : 30 - 35
  • [4] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [5] High Level Energy Consumption Estimation of Cryptographic Algorithms
    Khaddour, M.
    Hammami, O.
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2627 - 2632
  • [6] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [7] Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols
    Sriram, Vinay K.
    Montgomery, Doug
    [J]. COMPUTER COMMUNICATIONS, 2017, 106 : 75 - 85
  • [8] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [9] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [10] Security and composition of multiparty cryptographic protocols
    Canetti, R
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202