Table 1: Time used from algorithms to generate the secret
to agree a SSK.
Param. Pub. Data Key Agr. Total Iter.
Elliptic Curve Diffie-Hellman
163bit K 110,90 100,00 210,90 10
192bit 185,90 195,30 381,20 10
224bit 298,50 281,20 579,70 10
233bit K 696,90 759,30 1456,20 10
239bit 1684,40 1626,60 3311,00 10
256bit 312,50 262,50 575,00 10
283bit K 407,80 442,20 850,00 10
384bit 493,70 415,70 909,40 10
409bit K 561,00 560,90 1121,90 10
521bit 1404,60 1342,20 2746,80 10
571bit 2845,30 2861,00 5706,30 10
Diffie-Hellman
512 37,51 68,58 106,09 100
768 116,25 227,19 343,44 100
1024 282,98 539,83 822,81 100
Matrix Conjugation Based Key Agreement
3 (279) 3,27 3,13 6,40 100
4 (496) 6,72 5,94 12,66 100
5 (775) 10,32 10,31 20,63 100
6 (1116) 16,72 15,47 32,19 100
7 (1519) 23,76 22,96 46,72 100
8 (1984) 33,90 31,41 65,31 100
9 (2511) 44,35 44,85 89,20 100
10 (3100) 57,97 56,87 114,84 100
11 (3751) 74,21 71,26 145,47 100
12 (4464) 93,91 89,53 183,44 100
be from 8 to 450 times faster than the two DH.
Providing the users new services on their mobile
device enlarges the need of security to protect the in-
formation exchanged; such information can contain
data about bank accounts, credit card numbers, pins
or simply passwords.
Currently existing cryptographic methods affect
too much usability of applications, charging the sys-
tem with resource consumption due to cryptographic
operations. Considering the growing business oppor-
tunity around the mobile world and, at the same time,
the need of new more performing applications that
can run on small capacity devices, as smartphones or
netbooks, this work’s results open the possibility to
apply such cryptographic methodology to many sce-
narios in mobile devices use and to continue working
in the development of innovative cryptographic meth-
ods based on new ideas.
REFERENCES
Ahmad, T., Hu, J., and Han, S. (2009). An efficient mobile
voting system security scheme based on elliptic curve
cryptography. Network and System Security, Interna-
tional Conference on, 0:474–479.
Barker, E., Johnson, D., and Smid, M. (2007). NIST SP
800-56A - Recommendation for Pair-Wise Key Estab-
lishment Schemes Using Discrete Logarithm Cryptog-
raphy. NIST.
Bodrato, M. (2009). Personal communication.
Celler, F. and Leedham-Green, C. R. (1995). Calculating
the order of an invertible matrix. In In Groups and
Computation II, pages 55–60. American Mathemati-
cal Society.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, IT-22(6):644–654.
Dignan, L. (2009). Smartphone operating systems: The
market share, usage disconnect.
Grillo, A., Lentini, A., Me, G., and Italiano, G. F. (2008a).
Transaction oriented text messaging with trusted-sms.
In ACSAC, pages 485–494. IEEE Computer Society.
Grillo, A., Lentini, A., Me, G., and Rulli, G. (2008b).
Trusted sms - a novel framework for non-repudiable
sms-based processes. In Azevedo, L. and Londral,
A. R., editors, HEALTHINF (1), pages 43–50. IN-
STICC - Institute for Systems and Technologies of In-
formation, Control and Communication.
NIST (1999). Recommended elliptic curves for federal gov-
ernment use. Technical report, NIST.
Ottaviani, V., Italiano, G. F., Grillo, A., and Lentini, A.
(2009). Benchmarking for the qp cryptographic suite.
Technical report, University of Rome “Tor Vergata”,
dept. of Informatics, Systems and Production.
PRNewswire (2007). Rcs announces 2007 January-June
trading data for the global cellular phone open mar-
ket. Note.
Rescorla, E. (1999). Rfc 2631 - Diffie-Hellman key agree-
ment method. Technical report, RTFM Inc.
Research, C. (2000). Standards for efficient cryp-
tography - SEC 1: Elliptic curve cryptogra-
phy. Technical Report 20, Certicom Corp., secg-
talk@lists.certicom.com.
Sakalauskas, E., Tvarijonas, P., and Raulynaitis, A. (2007).
Key agreement protocol (kap) using conjugacy and
discrete logarithm problems in group representation
level. Informatica, 18(1):115–124.
Snol, L. (2009a). More smartphones than PCs by 2011. PC
Advisor, August 2009.
Snol, L. (2009b). Smartphones racing past boring mobiles.
PC Advisor, August 2009.
SECRYPT 2010 - International Conference on Security and Cryptography
416