Title :
Authentication for low power systems
Author :
Marvel, Lisa M. ; Boncelet, Charles G., Jr.
Author_Institution :
US Army Res. Lab., Aberdeen Proving Ground, MD, USA
Abstract :
In this paper, we present a new method for authenticating messages. The method is suitable in situations where severe power or computational constraints prevent the use of conventional authentication algorithms. It is based on a computationally simple message authentication code (MAC) and the generation of a chain of keys that have a limited lifetime. Since the generation of keys is computationally intensive in comparison to the MAC, many messages may be authenticated during the lifespan of a single key. This minimizes power and memory usage without compromising the security of the key chain. Applicable scenarios for this fast, low power authentication are also described.
Keywords :
cryptography; message authentication; military communication; packet radio networks; protocols; telecommunication security; MAC; authentication algorithms; chain of keys; lifetime; low power systems; message authentication code; Batteries; Forgery; Information security; Laboratories; Message authentication; Military computing; Power systems; Public key; Public key cryptography; Streaming media;
Conference_Titel :
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
Print_ISBN :
0-7803-7225-5
DOI :
10.1109/MILCOM.2001.985777