Computing Cryptographic Algorithms in Portable and Embedded Devices

Archana Ramachandran, Zhibin Zhou, Dijiang Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Abstract

Elliptic curve cryptography (ECC) and Pairings get more research attentions for computational constraint devices such as Pocket PCs and wireless sensors. As a result, computational evaluations of various cryptographic algorithms are highly desired to guide researchers to design effective communication protocols. In order to achieve this goal, we conduct comparative performance evaluations for Pocket PC and wireless sensors to study the computational ability to process cryptographic functions, such as point multiplication, Pairings, AES, and hash functions. Our study shows that current Pocket PC level devices are capable to process computational intensive cryptographic functions, such as Parings. However, purely software cryptographic solutions require long time to process cryptographic algorithms and special optimization methods must be used to improve the computation performance.

Original languageEnglish (US)
Title of host publication2007 IEEE International Conference on Portable Information Devices, PIDs 2007
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)1424410398, 9781424410392
DOIs
StatePublished - 2007
Event1st IEEE International Conference on Portable Information Devices, PIDs 2007 - Orlando, United States
Duration: Mar 25 2007Mar 29 2007

Other

Other1st IEEE International Conference on Portable Information Devices, PIDs 2007
CountryUnited States
CityOrlando
Period3/25/073/29/07

Fingerprint

Hash functions
Sensors
Cryptography
Network protocols

Keywords

  • Advanced Encryption Standard (AES)
  • Elliptic Curve Cryptography (ECC)
  • Pairings

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications

Cite this

Ramachandran, A., Zhou, Z., & Huang, D. (2007). Computing Cryptographic Algorithms in Portable and Embedded Devices. In 2007 IEEE International Conference on Portable Information Devices, PIDs 2007 [4216942] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/PORTABLE.2007.47

Computing Cryptographic Algorithms in Portable and Embedded Devices. / Ramachandran, Archana; Zhou, Zhibin; Huang, Dijiang.

2007 IEEE International Conference on Portable Information Devices, PIDs 2007. Institute of Electrical and Electronics Engineers Inc., 2007. 4216942.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ramachandran, A, Zhou, Z & Huang, D 2007, Computing Cryptographic Algorithms in Portable and Embedded Devices. in 2007 IEEE International Conference on Portable Information Devices, PIDs 2007., 4216942, Institute of Electrical and Electronics Engineers Inc., 1st IEEE International Conference on Portable Information Devices, PIDs 2007, Orlando, United States, 3/25/07. https://doi.org/10.1109/PORTABLE.2007.47
Ramachandran A, Zhou Z, Huang D. Computing Cryptographic Algorithms in Portable and Embedded Devices. In 2007 IEEE International Conference on Portable Information Devices, PIDs 2007. Institute of Electrical and Electronics Engineers Inc. 2007. 4216942 https://doi.org/10.1109/PORTABLE.2007.47
Ramachandran, Archana ; Zhou, Zhibin ; Huang, Dijiang. / Computing Cryptographic Algorithms in Portable and Embedded Devices. 2007 IEEE International Conference on Portable Information Devices, PIDs 2007. Institute of Electrical and Electronics Engineers Inc., 2007.
@inproceedings{f167e421358946c298e64df751d7cb96,
title = "Computing Cryptographic Algorithms in Portable and Embedded Devices",
abstract = "Elliptic curve cryptography (ECC) and Pairings get more research attentions for computational constraint devices such as Pocket PCs and wireless sensors. As a result, computational evaluations of various cryptographic algorithms are highly desired to guide researchers to design effective communication protocols. In order to achieve this goal, we conduct comparative performance evaluations for Pocket PC and wireless sensors to study the computational ability to process cryptographic functions, such as point multiplication, Pairings, AES, and hash functions. Our study shows that current Pocket PC level devices are capable to process computational intensive cryptographic functions, such as Parings. However, purely software cryptographic solutions require long time to process cryptographic algorithms and special optimization methods must be used to improve the computation performance.",
keywords = "Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), Pairings",
author = "Archana Ramachandran and Zhibin Zhou and Dijiang Huang",
year = "2007",
doi = "10.1109/PORTABLE.2007.47",
language = "English (US)",
isbn = "1424410398",
booktitle = "2007 IEEE International Conference on Portable Information Devices, PIDs 2007",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Computing Cryptographic Algorithms in Portable and Embedded Devices

AU - Ramachandran, Archana

AU - Zhou, Zhibin

AU - Huang, Dijiang

PY - 2007

Y1 - 2007

N2 - Elliptic curve cryptography (ECC) and Pairings get more research attentions for computational constraint devices such as Pocket PCs and wireless sensors. As a result, computational evaluations of various cryptographic algorithms are highly desired to guide researchers to design effective communication protocols. In order to achieve this goal, we conduct comparative performance evaluations for Pocket PC and wireless sensors to study the computational ability to process cryptographic functions, such as point multiplication, Pairings, AES, and hash functions. Our study shows that current Pocket PC level devices are capable to process computational intensive cryptographic functions, such as Parings. However, purely software cryptographic solutions require long time to process cryptographic algorithms and special optimization methods must be used to improve the computation performance.

AB - Elliptic curve cryptography (ECC) and Pairings get more research attentions for computational constraint devices such as Pocket PCs and wireless sensors. As a result, computational evaluations of various cryptographic algorithms are highly desired to guide researchers to design effective communication protocols. In order to achieve this goal, we conduct comparative performance evaluations for Pocket PC and wireless sensors to study the computational ability to process cryptographic functions, such as point multiplication, Pairings, AES, and hash functions. Our study shows that current Pocket PC level devices are capable to process computational intensive cryptographic functions, such as Parings. However, purely software cryptographic solutions require long time to process cryptographic algorithms and special optimization methods must be used to improve the computation performance.

KW - Advanced Encryption Standard (AES)

KW - Elliptic Curve Cryptography (ECC)

KW - Pairings

UR - http://www.scopus.com/inward/record.url?scp=84934300668&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84934300668&partnerID=8YFLogxK

U2 - 10.1109/PORTABLE.2007.47

DO - 10.1109/PORTABLE.2007.47

M3 - Conference contribution

AN - SCOPUS:84934300668

SN - 1424410398

SN - 9781424410392

BT - 2007 IEEE International Conference on Portable Information Devices, PIDs 2007

PB - Institute of Electrical and Electronics Engineers Inc.

ER -