Cryptographically generated addresses for constrained devices

被引:3
|
作者
Castelluccia, C
机构
[1] INRIA, F-38330 Montbonnot St Martin, France
[2] Univ Calif Irvine, Irvine, CA USA
关键词
CGA; IPv6; security; mobile IPv6; address ownership;
D O I
10.1023/B:WIRE.0000047065.81535.84
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cryptographically Generated Addresses (CGAs) have been designed to solve the so-called IPv6 Address Ownership problem. The current IETF CGA proposal relies on RSA signature. Generating an RSA signature is quite expensive and might be prohibitive for small devices with limited capacities. For example, a 1024-RSA signature requires approximately 1536 modular multiplications. In this paper, we propose a new CGA scheme whose verification requires fewer than 10 modular multiplications. We achieve this performance gain by (1) selecting an efficient signature scheme, namely the small prime variation of the Feige-Fiat-Shamir scheme and (2) tuning the cryptographic parameters of this signature scheme to the security strength of the CGA (i.e. the size of the hash function used to generate it).
引用
收藏
页码:221 / 232
页数:12
相关论文
共 50 条
  • [1] Cryptographically Generated Addresses for Constrained Devices*
    Claude Castelluccia
    [J]. Wireless Personal Communications, 2004, 29 : 221 - 232
  • [2] Cryptographically generated addresses (CGA)
    Aura, T
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 29 - 43
  • [3] Analysis and Optimization of Cryptographically Generated Addresses
    Bos, Joppe W.
    Oezen, Onur
    Hubaux, Jean-Pierre
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 17 - +
  • [4] Securing group management in IPv6 with cryptographically generated addresses
    Castelluccia, C
    Montenegro, G
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 588 - 593
  • [5] Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
    Cheneau, Tony
    Boudguiga, Aymen
    Laurent, Maryline
    [J]. COMPUTERS & SECURITY, 2010, 29 (04) : 419 - 431
  • [6] Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
    Qadir, Sana
    Siddiqi, Mohammad Umar
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (02): : 24 - 31
  • [7] A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT
    Beatriz Orue, Amalia
    Hernandez Encinas, Luis
    Fernandez, Veronica
    Montoya, Fausto
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'17- CISIS'17-ICEUTE'17 PROCEEDINGS, 2018, 649 : 672 - 682
  • [8] Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
    Cao, Zhen
    Deng, Hui
    Ma, Yuanchen
    Hu, Po
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 514 - 525
  • [9] Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
    Bauer, Christian
    Ehammer, Max
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 555 - 560
  • [10] Survey of the SEcure neighbor discovery (SEND) and multi-key cryptographically generated addresses (MCGAs)
    Park, Jin Ho
    Choi, Kyung Ho
    Kim, Jung Sik
    Cho, Che Ik
    Jang, Hyun Jun
    Im, Eul Gyu
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2124 - +