Title :
Using Merkle´s Puzzle for key agreement with low-end devices
Author :
Armknecht, Frederik ; Westhoff, Dirk
Author_Institution :
Lehrstuhl fur Systemsicherheit Bochum, Ruhr Univ. Bochum, Bochum, Germany
Abstract :
Due to severe resource restrictions, many established cryptographic schemes are not executable in sensor and actuator networks. Especially for key exchange algorithms (KE), the foundation of many cryptographic protocols, the situation is extremely challenging as most KE rely on elaborate computations and/or huge data. Hence, there is a continuous search for KE with reduced complexity. Observe that most KE burden the same workload on both communication partners. In this paper, we follow a different approach that respects the usually asymmetric capabilities of network nodes and users. We describe a key agreement protocol that allows for pushing the workload almost completely to the stronger device, e.g., the user. This allows to get any desired security level, independent of the capabilities of the weak device.
Keywords :
cryptographic protocols; Merkles puzzle; cryptographic schemes; key agreement protocol; key exchange algorithms; low-end devices; Actuators; Application software; Arithmetic; Conferences; Cryptographic protocols; Data security; Delay effects; Public key cryptography; Sensor systems and applications; Synchronization;
Conference_Titel :
Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on
Conference_Location :
Zurich
Print_ISBN :
978-1-4244-4488-5
Electronic_ISBN :
978-1-4244-4487-8
DOI :
10.1109/LCN.2009.5355012