Cryptographically generated addresses for constrained devices

被引:3
|
作者
Castelluccia, C
机构
[1] INRIA, F-38330 Montbonnot St Martin, France
[2] Univ Calif Irvine, Irvine, CA USA
关键词
CGA; IPv6; security; mobile IPv6; address ownership;
D O I
10.1023/B:WIRE.0000047065.81535.84
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cryptographically Generated Addresses (CGAs) have been designed to solve the so-called IPv6 Address Ownership problem. The current IETF CGA proposal relies on RSA signature. Generating an RSA signature is quite expensive and might be prohibitive for small devices with limited capacities. For example, a 1024-RSA signature requires approximately 1536 modular multiplications. In this paper, we propose a new CGA scheme whose verification requires fewer than 10 modular multiplications. We achieve this performance gain by (1) selecting an efficient signature scheme, namely the small prime variation of the Feige-Fiat-Shamir scheme and (2) tuning the cryptographic parameters of this signature scheme to the security strength of the CGA (i.e. the size of the hash function used to generate it).
引用
收藏
页码:221 / 232
页数:12
相关论文
共 50 条
  • [21] A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen
    Zhang, Lejun
    Zhang, Zhijie
    Wang, Weizheng
    Waqas, Rasheed
    Zhao, Chunhui
    Kim, Seokhoon
    Chen, Huiling
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (01): : 597 - 616
  • [22] Posture strategies generated by constrained optimization
    Pettersson, Robert
    Bartonek, Asa
    Gutierrez-Farewik, Elena M.
    [J]. JOURNAL OF BIOMECHANICS, 2012, 45 (03) : 461 - 468
  • [23] Blockchains for constrained edge devices
    Douglas, Antonyo
    Holloway, Richard
    Lohr, Jonathan
    Morgan, Elijah
    Harfoush, Khaled
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2020, 1 (1-2):
  • [24] PGP in constrained wireless devices
    Brown, M
    Cheung, D
    Hankerson, D
    Hernandez, JL
    Kirkup, M
    Menezes, A
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 247 - 261
  • [25] Dilithium for Memory Constrained Devices
    Bos, Joppe W.
    Renes, Joost
    Sprenkels, Amber
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 217 - 235
  • [26] Wavelet library for constrained devices
    Ehlers, Johan Hendrik
    Jassim, Sabah A.
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [27] MASS Communication for Constrained Devices
    Huang, Cheng
    Tay, Zeng Huy
    Harfoush, Khaled
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [28] Lightweight Cryptography for Constrained Devices
    Alippi, Cesare
    Bogdanov, Andrey
    Regazzoni, Francesco
    [J]. 2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 144 - 147
  • [29] In Situ Generated Medical Devices
    Cohn, Daniel
    Sloutski, Aaron
    Elyashiv, Ariel
    Varma, Vijaykumar B.
    Ramanujan, Raju
    [J]. ADVANCED HEALTHCARE MATERIALS, 2019, 8 (08)
  • [30] Analysing and improving performance and security of cryptographically generated address algorithm for mobile IPv6 networks
    Qadir, Sana
    Siddiqi, Mohammad Umar
    Al-Khateeb, Wajdi F.M.
    [J]. International Journal of Network Security, 2015, 17 (05) : 535 - 547