Public Key Cryptography in Sensor Networks—Revisited

The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gaubatz, Gunnar, Kaps, Jens-Peter, Sunar, Berk
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 18
container_issue
container_start_page 2
container_title
container_volume
creator Gaubatz, Gunnar
Kaps, Jens-Peter
Sunar, Berk
description The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of protocols [1] using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we challenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware assisted approach for which we claim that it makes public key cryptography feasible in such environments, provided we use the right selection of algorithms and associated parameters, careful optimization, and low-power design techniques. In order to validate our claim we present proof of concept implementations of two different algorithms—Rabin’s Scheme and NtruEncrypt—and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20 μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.
doi_str_mv 10.1007/978-3-540-30496-8_2
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_16547016</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>16547016</sourcerecordid><originalsourceid>FETCH-LOGICAL-j293t-d918e6fe7b177a7c6a5958648113e97be4e6d92f7453d507010a8f981334b73e3</originalsourceid><addsrcrecordid>eNotkMlOwzAQhs0mUUqfgEsuHA2ejOPliCo2UQFiOVtO4pS0JYnsAMqNh-AJeRLcFl9Gnv-bkeYj5ATYGTAmz7VUFGnGGUXGtaDKpDvkCGNj85e7ZAQCgCJyvUcmEV9nKUct2D4ZRSqlWnI8JJMQFiy-mKVcjoh4_MhXdZHcuSGZ-qHr27m33duQ1E3y7JrQ-uTe9V-tX4bf758n91mHunflMTmo7Cq4yX8dk9ery5fpDZ09XN9OL2Z0kWrsaalBOVE5mYOUVhbCZjpTgisAdFrmjjtR6rSSPMMyY5IBs6rSCuIhuUSHY3K63dvZUNhV5W1T1MF0vn63fjAgMh6HRORgy4UYNXPnTd62y2CAmbVAE40YNNGJ2QgzUSD-AdxSXcY</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Public Key Cryptography in Sensor Networks—Revisited</title><source>Springer Books</source><creator>Gaubatz, Gunnar ; Kaps, Jens-Peter ; Sunar, Berk</creator><contributor>Westhoff, Dirk ; Paar, Christof ; Castelluccia, Claude ; Hartenstein, Hannes</contributor><creatorcontrib>Gaubatz, Gunnar ; Kaps, Jens-Peter ; Sunar, Berk ; Westhoff, Dirk ; Paar, Christof ; Castelluccia, Claude ; Hartenstein, Hannes</creatorcontrib><description>The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of protocols [1] using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we challenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware assisted approach for which we claim that it makes public key cryptography feasible in such environments, provided we use the right selection of algorithms and associated parameters, careful optimization, and low-power design techniques. In order to validate our claim we present proof of concept implementations of two different algorithms—Rabin’s Scheme and NtruEncrypt—and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20 μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540243960</identifier><identifier>ISBN: 3540243968</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540304967</identifier><identifier>EISBN: 9783540304968</identifier><identifier>DOI: 10.1007/978-3-540-30496-8_2</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Clock Cycle ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Sensor Network ; Sensor Node ; Software ; Very Large Scale Integration ; Wireless Sensor Network</subject><ispartof>Lecture notes in computer science, 2005, p.2-18</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-30496-8_2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-30496-8_2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16547016$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Westhoff, Dirk</contributor><contributor>Paar, Christof</contributor><contributor>Castelluccia, Claude</contributor><contributor>Hartenstein, Hannes</contributor><creatorcontrib>Gaubatz, Gunnar</creatorcontrib><creatorcontrib>Kaps, Jens-Peter</creatorcontrib><creatorcontrib>Sunar, Berk</creatorcontrib><title>Public Key Cryptography in Sensor Networks—Revisited</title><title>Lecture notes in computer science</title><description>The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of protocols [1] using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we challenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware assisted approach for which we claim that it makes public key cryptography feasible in such environments, provided we use the right selection of algorithms and associated parameters, careful optimization, and low-power design techniques. In order to validate our claim we present proof of concept implementations of two different algorithms—Rabin’s Scheme and NtruEncrypt—and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20 μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.</description><subject>Applied sciences</subject><subject>Clock Cycle</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Sensor Network</subject><subject>Sensor Node</subject><subject>Software</subject><subject>Very Large Scale Integration</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540243960</isbn><isbn>3540243968</isbn><isbn>3540304967</isbn><isbn>9783540304968</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkMlOwzAQhs0mUUqfgEsuHA2ejOPliCo2UQFiOVtO4pS0JYnsAMqNh-AJeRLcFl9Gnv-bkeYj5ATYGTAmz7VUFGnGGUXGtaDKpDvkCGNj85e7ZAQCgCJyvUcmEV9nKUct2D4ZRSqlWnI8JJMQFiy-mKVcjoh4_MhXdZHcuSGZ-qHr27m33duQ1E3y7JrQ-uTe9V-tX4bf758n91mHunflMTmo7Cq4yX8dk9ery5fpDZ09XN9OL2Z0kWrsaalBOVE5mYOUVhbCZjpTgisAdFrmjjtR6rSSPMMyY5IBs6rSCuIhuUSHY3K63dvZUNhV5W1T1MF0vn63fjAgMh6HRORgy4UYNXPnTd62y2CAmbVAE40YNNGJ2QgzUSD-AdxSXcY</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Gaubatz, Gunnar</creator><creator>Kaps, Jens-Peter</creator><creator>Sunar, Berk</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Public Key Cryptography in Sensor Networks—Revisited</title><author>Gaubatz, Gunnar ; Kaps, Jens-Peter ; Sunar, Berk</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j293t-d918e6fe7b177a7c6a5958648113e97be4e6d92f7453d507010a8f981334b73e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Clock Cycle</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Sensor Network</topic><topic>Sensor Node</topic><topic>Software</topic><topic>Very Large Scale Integration</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gaubatz, Gunnar</creatorcontrib><creatorcontrib>Kaps, Jens-Peter</creatorcontrib><creatorcontrib>Sunar, Berk</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gaubatz, Gunnar</au><au>Kaps, Jens-Peter</au><au>Sunar, Berk</au><au>Westhoff, Dirk</au><au>Paar, Christof</au><au>Castelluccia, Claude</au><au>Hartenstein, Hannes</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Public Key Cryptography in Sensor Networks—Revisited</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>2</spage><epage>18</epage><pages>2-18</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540243960</isbn><isbn>3540243968</isbn><eisbn>3540304967</eisbn><eisbn>9783540304968</eisbn><abstract>The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of protocols [1] using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we challenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware assisted approach for which we claim that it makes public key cryptography feasible in such environments, provided we use the right selection of algorithms and associated parameters, careful optimization, and low-power design techniques. In order to validate our claim we present proof of concept implementations of two different algorithms—Rabin’s Scheme and NtruEncrypt—and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20 μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/978-3-540-30496-8_2</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.2-18
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_16547016
source Springer Books
subjects Applied sciences
Clock Cycle
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Sensor Network
Sensor Node
Software
Very Large Scale Integration
Wireless Sensor Network
title Public Key Cryptography in Sensor Networks—Revisited
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T11%3A56%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Public%20Key%20Cryptography%20in%20Sensor%20Networks%E2%80%94Revisited&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Gaubatz,%20Gunnar&rft.date=2005&rft.spage=2&rft.epage=18&rft.pages=2-18&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540243960&rft.isbn_list=3540243968&rft_id=info:doi/10.1007/978-3-540-30496-8_2&rft_dat=%3Cpascalfrancis_sprin%3E16547016%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540304967&rft.eisbn_list=9783540304968&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true