Title :
Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)
Author :
Ponomarev, Oleg ; Khurri, Andrey ; Gurtov, Andrei
Author_Institution :
Helsinki Inst. for Inf. Technol. HUT, Aalto Univ., Espoo, Finland
Abstract :
We compare computational resources required for handling control plane of the Host Identity Protocol (HIP) using Rivest-Shamir-Adleman (RSA) versus Elliptic Curve Cryptography (ECC) encryption algorithms with keys of equivalent strength. We show that servers would establish almost three times more HIP connections per second when ECC is used for generating the session key. For devices with low computational power such as Nokia N810 Internet Tablet, the use of ECC would notably reduce the delay to establish a HIP association. Unless compatibility with legacy RSA/DSA-only systems is needed, the Host Identity may be an ECC key as well, but such a modification would bring only 50 percent additional performance with the current default keys. However the situation becomes different under higher security requirements when employing ECC for the host identification boosts the performance more than four times, and we consider ECC Host Identities desirable in that case.
Keywords :
Internet; cryptographic protocols; public key cryptography; Nokia N810 Internet tablet; Rivest-Shamir-Adleman; elliptic curve cryptography; encryption algorithms; host identity protocol; Computer architecture; Computer networks; Cryptographic protocols; DH-HEMTs; Delay; Elliptic curve cryptography; Hip; Information technology; Internet; Routing;
Conference_Titel :
Networks (ICN), 2010 Ninth International Conference on
Conference_Location :
Menuires
Print_ISBN :
978-1-4244-6083-0
DOI :
10.1109/ICN.2010.68