Unbalancing Computations for SM2 Key Exchange Protocols

被引:0
|
作者
Zhao, Chenxi [1 ]
Zhang, Jie [1 ]
Huang, Xin [2 ]
机构
[1] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
[2] Suzhou Blocks Informat Technol Co Ltd, Suzhou, Peoples R China
关键词
Authenticated Key Exchange; Elliptic Curve Diffie-Helman; Lightweight Security Protocol; Internet of Things Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM2 is a national ecliptic curve public key algorithm standard promulgated by the State Cryptography Administration (SCA) of China. It contains an authenticated key exchange (AKE) protocol which can establish shared secret keys for two communicating parties. However, the computational burden is generally too heavy for capability-limited devices in Internet of Things (IoT). This paper alleviates its computational burden on limited devices by transferring some time-consuming operations from a limited device to its more powerful communicating partner. Two computationally unbalanced protocols are designed. Compared with the original protocols, the computationally unbalanced protocols are more friendly to limited devices.
引用
下载
收藏
页码:335 / 341
页数:7
相关论文
共 50 条
  • [21] Timing leakage to break SM2 signature algorithm
    Chen, Aidong
    Hong, Chen
    Shang, Xinna
    Jing, Hongyuan
    Xu, Sen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [22] EHNP Strikes Back: Analyzing SM2 Implementations
    Cao, Jinzheng
    Cheng, Qingfeng
    Weng, Jian
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 576 - 600
  • [23] An Efficient ASIC Implementation of Public Key Cryptography Algorithm SM2 Based on Module Arithmetic Logic Unit
    Yang, Danyang
    Dai, Zibin
    Li, Wei
    Chen, Tao
    2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2019,
  • [24] Asymmetric disribution of computations in Internet Key Exchange Protocol
    Karbasioun, Mohammad Mehdi
    Berenjkub, Mehdi
    Taji, Bahareh
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1449 - +
  • [25] Comparative Analysis of Internet Key Exchange Protocols
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    Majeed, Muhammad Younas
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [26] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [27] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [28] Analysis and modification of the Internet Key Exchange Protocols
    Jianfan Wei Renliang Yuan (Communication
    信息安全与通信保密, 2005, (07) : 156 - 159
  • [29] Downgrade Resilience in Key-Exchange Protocols
    Bhargavan, Karthikeyan
    Brzuska, Christina
    Fournet, Cedric
    Green, Matthew
    Kohlweiss, Markulf
    Zanella-Beguelin, Santiago
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
  • [30] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +