As an increasing number of Internet hosts are wireless C handheld devices with small memory and strict CPU-latency constraints C the performance of cryptography methods has become critical for high transaction throughput. Elliptic Curve Cryptography 8ECC 9 is emerging as an attractive public-key system for constrained environments C because of the small key sizes and computational efficiency C while preserving the same security level as the standard methods. The memory performance of ECC algorithms was scarcely investigated.DAWe have developed a set of kernel benchmarks to examine performance of standard and corresponding elliptic curve public-key methods. In this paper C we characterize the operations and their memory impact on performance in Diffie-Hellman key exchange C digital signature algorithm C ElGamal C and RSA public-key cryptosystem C as well as elliptic curve Diffie-Hellman key exchange C elliptic curve digital signature algorithm and elliptic curve El-Gamal algorithm. DAWe modeled a typical mobile device based on the Intel XScale architecture C which utilizes an ARM processor core and studied the benchmark set on that target. Different possible variations for the memory hierarchy of such basic architecture were considered. We compared our benchmarks with MiBench FSecurity C another widely accepted benchmark set C in order to provide a reference for our evaluation.

I., B., Giorgi, R., Martinelli, E. (2003). Memory Performance of Public-Key cryptography Methods in Mobile Environments. In ACM SIGARCH Workshop on MEmory performance: DEaling with Applications, systems and architecture (pp.24-31).

Memory Performance of Public-Key cryptography Methods in Mobile Environments

GIORGI, ROBERTO;MARTINELLI, ENRICO
2003-01-01

Abstract

As an increasing number of Internet hosts are wireless C handheld devices with small memory and strict CPU-latency constraints C the performance of cryptography methods has become critical for high transaction throughput. Elliptic Curve Cryptography 8ECC 9 is emerging as an attractive public-key system for constrained environments C because of the small key sizes and computational efficiency C while preserving the same security level as the standard methods. The memory performance of ECC algorithms was scarcely investigated.DAWe have developed a set of kernel benchmarks to examine performance of standard and corresponding elliptic curve public-key methods. In this paper C we characterize the operations and their memory impact on performance in Diffie-Hellman key exchange C digital signature algorithm C ElGamal C and RSA public-key cryptosystem C as well as elliptic curve Diffie-Hellman key exchange C elliptic curve digital signature algorithm and elliptic curve El-Gamal algorithm. DAWe modeled a typical mobile device based on the Intel XScale architecture C which utilizes an ARM processor core and studied the benchmark set on that target. Different possible variations for the memory hierarchy of such basic architecture were considered. We compared our benchmarks with MiBench FSecurity C another widely accepted benchmark set C in order to provide a reference for our evaluation.
2003
I., B., Giorgi, R., Martinelli, E. (2003). Memory Performance of Public-Key cryptography Methods in Mobile Environments. In ACM SIGARCH Workshop on MEmory performance: DEaling with Applications, systems and architecture (pp.24-31).
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/46873
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo