Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography

被引:0
|
作者
Khajuria, Samant [1 ]
Tange, Henrik [1 ]
机构
[1] Univ Copenhagen, Univ Aalborg, Wirelessctr CTIF Copenhagen, Coll Engn, Lautrupvang 15, DK-2750 Ballerup, Copenhagen, Denmark
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work describes a low-cost Public key Cryptography (PKC) based solution for security services such as authentication as required for wireless sensor networks. We have implemented a software approach using Elliptic Curve Cryptography (ECC) over GF (2(m)) in order to obtain stronger cryptography. In our approach we are using Koblitz curves and TNAF ( tau - adic non-adjacent form) with partial reduction modulo. A Diffie-Hellman key exchange is implemented. This public key exchange is done between two participants in the network. The actual implementation is done at an 8-bit ATmega128L Micaz platform from Crossbow. Results has shown that the point calculation can be done fairly amount of time with relatively small space consumption.
引用
收藏
页码:713 / +
页数:3
相关论文
共 50 条
  • [1] A New Approach of Elliptic Curve Diffie-Hellman Key Exchange
    Mehibel, Nissa
    Hamadouche, M'hamed
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [2] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [3] Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme on IRIS Nodes
    Zhang, Xing
    Ma, Shaohua
    Han, Dong
    Shi, Wei
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 160 - 163
  • [4] On the bits of elliptic curve Diffie-Hellman keys
    Jao, David
    Jetchev, Dimitar
    Venkatesan, Ramarathnam
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 33 - +
  • [5] Interpolation of the elliptic curve Diffie-Hellman mapping
    Lange, T
    Winterhof, A
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 51 - 60
  • [6] On the Bit Security of Elliptic Curve Diffie-Hellman
    Shani, Barak
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 : 361 - 387
  • [7] Key Generation for DNA Cryptography Using Genetic Operators and Diffie-Hellman Key Exchange Algorithm
    Vidhya, E.
    Rathipriya, R.
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2020, 15 (04): : 1109 - 1115
  • [8] Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
    Wang, Shengbao
    Cao, Zhenfu
    Strangio, Maurizio Adriano
    Wang, Lihua
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (02) : 149 - 151
  • [9] Research on the Bit Security of Elliptic Curve Diffie-Hellman
    Wei W.
    Chen J.
    Li D.
    Zhang B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1820 - 1827
  • [10] Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement
    Mohammad, Zeyad
    Lo, Chi-Chun
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 128 - 132