• DocumentCode
    377010
  • Title

    Authentication for low power systems

  • Author

    Marvel, Lisa M. ; Boncelet, Charles G., Jr.

  • Author_Institution
    US Army Res. Lab., Aberdeen Proving Ground, MD, USA
  • Volume
    1
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    135
  • Abstract
    In this paper, we present a new method for authenticating messages. The method is suitable in situations where severe power or computational constraints prevent the use of conventional authentication algorithms. It is based on a computationally simple message authentication code (MAC) and the generation of a chain of keys that have a limited lifetime. Since the generation of keys is computationally intensive in comparison to the MAC, many messages may be authenticated during the lifespan of a single key. This minimizes power and memory usage without compromising the security of the key chain. Applicable scenarios for this fast, low power authentication are also described.
  • Keywords
    cryptography; message authentication; military communication; packet radio networks; protocols; telecommunication security; MAC; authentication algorithms; chain of keys; lifetime; low power systems; message authentication code; Batteries; Forgery; Information security; Laboratories; Message authentication; Military computing; Power systems; Public key; Public key cryptography; Streaming media;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
  • Print_ISBN
    0-7803-7225-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.2001.985777
  • Filename
    985777