Title :
Optimizing public-key encryption for wireless clients
Author :
Potlapally, Nachiketh R. ; Ravi, Srivaths ; Raghunathan, Anand ; Lakshminarayana, Ganesh
Author_Institution :
C&C Res. Labs., NEC, Princeton, NJ, USA
Abstract :
Providing acceptable levels of security imposes significant computational requirements on wireless clients, servers, and network elements. These requirements are often beyond the modest processing capabilities and energy (battery) resources available on wireless clients. The relatively small sizes of wireless data transactions imply that public-key encryption algorithms dominate the security processing requirements. We propose techniques to improve the computational efficiency of public-key encryption algorithms. We focus on the modular exponentiation based encryption/decryption employed in many popular public-key algorithms. We study an extensive suite of algorithmic optimizations to the basic modular exponentiation algorithm and new advanced techniques. The proposed algorithmic optimizations lead to an "algorithm design space", across which performance varies significantly (over an order-of-magnitude). We evaluated the proposed algorithmic optimization techniques by obtaining processing times for the SSL (secure sockets layer) handshake protocol on a state-of-the-art embedded processor by using the optimal algorithm configuration and a popular conventional algorithm configuration. The results demonstrate that the optimum algorithm configuration leads to a 5.7× improvement in SSL handshake protocol processing times. The proposed techniques are complementary to, and can be applied in conjunction with, improvements in security mechanisms and protocols, new hardware architectures, and improvements in silicon technologies.
Keywords :
Internet; computational complexity; optimisation; protocols; public key cryptography; radio links; telecommunication security; SSL handshake protocol; battery resources; computational efficiency; decryption; embedded processor; handshake protocol; modular exponentiation; processing capabilities; public-key encryption; secure sockets layer; security processing; wireless Internet; wireless clients; Batteries; Communication system security; Computational efficiency; Computer networks; Cryptography; Data security; Design optimization; Network servers; Protocols; Public key;
Conference_Titel :
Communications, 2002. ICC 2002. IEEE International Conference on
Print_ISBN :
0-7803-7400-2
DOI :
10.1109/ICC.2002.997014