Title :
Scalability analysis of selected certificate validation scenarios
Author_Institution :
Norwegian Defence Research Establishment
fDate :
Oct. 31 2010-Nov. 3 2010
Abstract :
The use of public key based cryptographic algorithms enables new applications for encryption and digital signatures, and offers solution to a range of authentication and information integrity problems. One cause of concern regarding public key cryptography is the amount of computational and network resources required for key management. Although this has been a research focus for some time, little work has been done to formally analyze the scalability properties of the key management procedures. The purpose of this paper is to offer an analysis of certificate validation operations from a scalability perspective. Furthermore, the focus of the analysis is on client side data rates. This focus has been chosen since the capacity of the network closest to the clients is scarce and likely to be a bottleneck. This is particularly true when the clients are connected through a wireless tactical network.
Keywords :
message authentication; public key cryptography; client side data rates; information integrity; key management; public key cryptography; scalability analysis; selected certificate validation scenario; wireless tactical network; Analytical models; Data models; Equations; Mathematical model; Peer to peer computing; Receivers; Scalability;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
Conference_Location :
San Jose, CA
Print_ISBN :
978-1-4244-8178-1
DOI :
10.1109/MILCOM.2010.5680490