CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli
2010
Abstract
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation. Introduced in a theoretical frame by Sakalauskas et. al. in 2007, it is here implemented in J2ME on mobile devices (Nokia N70 equipped with Symbian S60 operating system). We study its appliability and performances and compare them with Elliptic Curve and standard Diffie-Hellman Bouncy Castle implementation, freely available on the web.
References
- Ahmad, T., Hu, J., and Han, S. (2009). An efficient mobile voting system security scheme based on elliptic curve cryptography. Network and System Security, International Conference on, 0:474-479.
- Barker, E., Johnson, D., and Smid, M. (2007). NIST SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. NIST.
- Bodrato, M. (2009). Personal communication.
- Celler, F. and Leedham-Green, C. R. (1995). Calculating the order of an invertible matrix. In In Groups and Computation II, pages 55-60. American Mathematical Society.
- Diffie, W. and Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654.
- Dignan, L. (2009). Smartphone operating systems: The market share, usage disconnect.
- Grillo, A., Lentini, A., Me, G., and Italiano, G. F. (2008a). Transaction oriented text messaging with trusted-sms. In ACSAC, pages 485-494. IEEE Computer Society.
- Grillo, A., Lentini, A., Me, G., and Rulli, G. (2008b). Trusted sms - a novel framework for non-repudiable sms-based processes. In Azevedo, L. and Londral, A. R., editors, HEALTHINF (1), pages 43-50. INSTICC - Institute for Systems and Technologies of Information, Control and Communication.
- NIST (1999). Recommended elliptic curves for federal government use. Technical report, NIST.
- Ottaviani, V., Italiano, G. F., Grillo, A., and Lentini, A. (2009). Benchmarking for the qp cryptographic suite. Technical report, University of Rome “Tor Vergata”, dept. of Informatics, Systems and Production.
- PRNewswire (2007). Rcs announces 2007 January-June trading data for the global cellular phone open market. Note.
- Rescorla, E. (1999). Rfc 2631 - Diffie-Hellman key agreement method. Technical report, RTFM Inc.
- Research, C. (2000). Standards for efficient cryptography - SEC 1: Elliptic curve cryptography. Technical Report 20, Certicom Corp., secgtalk@lists.certicom.com.
- Sakalauskas, E., Tvarijonas, P., and Raulynaitis, A. (2007). Key agreement protocol (kap) using conjugacy and discrete logarithm problems in group representation level. Informatica, 18(1):115-124.
- Snol, L. (2009a). More smartphones than PCs by 2011. PC Advisor, August 2009.
- Snol, L. (2009b). Smartphones racing past boring mobiles. PC Advisor, August 2009.
Paper Citation
in Harvard Style
Ottaviani V., Zanoni A. and Regoli M. (2010). CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 411-416. DOI: 10.5220/0002917904110416
in Bibtex Style
@conference{secrypt10,
author={Vittorio Ottaviani and Alberto Zanoni and Massimo Regoli},
title={CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={411-416},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002917904110416},
isbn={978-989-8425-18-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
SN - 978-989-8425-18-8
AU - Ottaviani V.
AU - Zanoni A.
AU - Regoli M.
PY - 2010
SP - 411
EP - 416
DO - 10.5220/0002917904110416