Cryptographically generated addresses for constrained devices

被引:3
|
作者
Castelluccia, C
机构
[1] INRIA, F-38330 Montbonnot St Martin, France
[2] Univ Calif Irvine, Irvine, CA USA
关键词
CGA; IPv6; security; mobile IPv6; address ownership;
D O I
10.1023/B:WIRE.0000047065.81535.84
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cryptographically Generated Addresses (CGAs) have been designed to solve the so-called IPv6 Address Ownership problem. The current IETF CGA proposal relies on RSA signature. Generating an RSA signature is quite expensive and might be prohibitive for small devices with limited capacities. For example, a 1024-RSA signature requires approximately 1536 modular multiplications. In this paper, we propose a new CGA scheme whose verification requires fewer than 10 modular multiplications. We achieve this performance gain by (1) selecting an efficient signature scheme, namely the small prime variation of the Feige-Fiat-Shamir scheme and (2) tuning the cryptographic parameters of this signature scheme to the security strength of the CGA (i.e. the size of the hash function used to generate it).
引用
收藏
页码:221 / 232
页数:12
相关论文
共 50 条
  • [31] Secure pairing of interface constrained devices
    Soriente, Claudio
    Tsudik, Gene
    Uzun, Ersin
    [J]. International Journal of Security and Networks, 2009, 4 (1-2) : 17 - 26
  • [32] A Distributed Notification Bus for Constrained Devices
    Visca, Jorge
    Baliosian, Javier
    Grampin, Eduardo
    [J]. 2009 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2009, : 50 - 55
  • [33] Anytime route planning with constrained devices
    Braga, Marcus de L.
    dos Santos, Alyson de J.
    Pedroza, Aloysio C. P.
    Costa, Luis Henrique M. K.
    de Amorim, Marcelo Dias
    Ghamri-Doudane, Yacine
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2016, 54 : 53 - 67
  • [34] embServe: Embedded Services for Constrained Devices
    Oliveira, Joao
    Sousa, Filipe
    Almeida, Luis
    [J]. 2023 IEEE 19TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2023, : 142 - 149
  • [35] Lightweight Message Authentication for Constrained Devices
    Dubrova, Elena
    Naslund, Mats
    Selander, Goran
    Lindqvist, Fredrik
    [J]. WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 196 - 201
  • [36] The Cost of OSCORE and EDHOC for Constrained Devices
    Hristozov, Stefan
    Huber, Manuel
    Xu, Lei
    Fietz, Jaro
    Liess, Marco
    Sigl, Georg
    [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 245 - 250
  • [37] Edge analytics on resource constrained devices
    Savitz, Sean
    Perera, Charith
    Rana, Omer
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (05) : 513 - 527
  • [38] Lightweight Cryptography for Resource Constrained Devices
    Shraddha, B. H.
    Kinnal, Bhagyashree
    Wali, Heera
    Iyer, Nalini C.
    Vishal, P.
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564
  • [39] Group Signatures are Suitable for Constrained Devices
    Canard, Sebastien
    Coisel, Iwen
    De Meulenaer, Giacomo
    Pereira, Olivier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 133 - +
  • [40] Efficient Implementations of MQPKS on Constrained Devices
    Czypek, Peter
    Heyse, Stefan
    Thomae, Enrico
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 374 - 389