A study of the energy consumption characteristics of cryptographic algorithms and security protocols

被引:244
|
作者
Potlapally, NR [1 ]
Ravi, S
Raghunathan, A
Jha, NK
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
3DES; AES; cryptographic algorithms; DES; Diffie-Hellman; DSA; ECC; embedded system; energy analysis; handheld; low-power; RSA; security; security protocols; SSL;
D O I
10.1109/TMC.2006.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices - battery life - and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level ( such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level ( cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.
引用
收藏
页码:128 / 143
页数:16
相关论文
共 50 条
  • [41] Security Level versus Energy Consumption in Wireless Protocols for Internet of Things
    Venckauskas, Algimantas
    Jusas, Nerijus
    Toldinas, Jevgenijus
    Kazanavicius, Egidijus
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2014, 2014, 465 : 419 - 429
  • [42] Energy Consumption of Protected Cryptographic Hardware Cores An Experimental Study
    Shahmirzadi, Aein Rezaei
    Moos, Thorben
    Moradi, Amir
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2023, 2023, 13979 : 195 - 220
  • [43] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
    Piatkowski, Jacek
    Szymoniak, Sabina
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):
  • [44] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [45] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57
  • [46] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
  • [47] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [48] Enhancing financial transaction security with lightweight cryptographic algorithms
    Deshpande, Vivek
    Khubalkar, Deepti
    Dhablia, Anishkumar
    Pasha, M. Jahir
    Dhabliya, Dharmesh
    Gandhi, Yatin
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 741 - 751
  • [49] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [50] Circuits for Security and Secure Circuits: Implementation of cryptographic algorithms
    Verbauwhede, Ingrid
    [J]. IEEE Solid-State Circuits Magazine, 2023, 15 (01): : 20 - 24