IBE Extension for HIP
Amir K.C., Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis
2013
Abstract
This article explores the possibilities to replace RSA public key identities and X.509 certificates with any unique identities and identity-based encryption (IBE) in the Base Exchange of the Host Identity Protocol (HIP). We have analysed the technical and trust-related details when applying IBE in HIP. These details include, for example, how to insert the IBE parameters into HIP packets and how to guarantee their correctness. We have extended OpenHIP v0.7 software with capabilities for X.509 certified RSA-based Host Identities, for trusted IBE-based Host Identities, and for IBE signatures in HIP messages.We have also measured HIP message times in the Base Exchange. These measurements show that the basic IBE solution is rather slow compared to RSA solution with certificates. However, if applications are such that it is necessary to check revocation lists often, the IBE solution is feasible.
References
- Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley (2008)
- Andersen, D.G., et al.: Accountable internet protocol (aip). In: Proceedings of SIGCOMM 2008. (2008) 339-350
- Camarillo, G., Melen, J.: HIP (Host Identity Protocol) Immediate Carriage and Conveyance of Upperlayer Protocol Signalling (HICCUPS) (2010) Internet Draft.
- Lagutin, D.: Securing the Internet with Digital Signatures. PhD thesis, Aalto University, Department of Computer Science and Engineering, Espoo, Finland (2010)
- P1363 Working Group: IEEE P1363.3TM /D1 Draft Standard for Identity-based Public-key Cryptography Using Pairings. IEEE. (2008) Retrieved October 19th, 2008 from http:// grouper.ieee.org/groups/1363/IBC/material/P1363.3-D1-200805.pdf.
- PBC library Retrieved January 10, 2013, from http://crypto.stanford.edu/pbc/.
- Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive, Report 2004/064 (2004) Retrieved November 15th, 2012 from http://eprint.iacr.org/2004/131.
- Hess, F.: Efficient identity based signature schemes based on pairings. In: SAC 2002. Volume 2595 of LNCS., Springer-Verlag (2002) 310-324
- Barreto, P., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Asiacrypt. Volume 3788 of LNCS., Springer-Verlag (2005) 515-532
- Forsgren, H., Grahn, K., Karvi, T., Pulkkis, G.: Security and trust of public key cryptography options for HIP. In: 10th IEEE International Conference on Computer and Information Technology (CIT 2010), IEEE Conference Publications (2010) 1079-1084
- Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal of Computing 32(3) (2003) 586-615
- OpenHIP overview (March 2012) Retrieved November 25, 2012 from http:// www.openhip.org/wiki/index.php?title=Overview.
- Helsinki Institute for Information Technology: HIP for Linux (2004) Retrieved November 25, 2012 from http://infrahip.hiit.fi/index.php?index=about.
- Ericsson Ab, NomadicLab: HIP for inter.net project (2008) Retrieved November 25, 2012 from http://hip4inter.net/.
- CuteHIP project Retrieved November 24, 2012 from http://code.google.com/p/cutehip/.
- Kuptsov, D.: Implementing CuteHIP: Feasibility analysis of Java-based network-layer security protocols. Technical report, Aalto University (2011) Retrieved November 24, 2012 from http://www.hiit.fi/u/kuptsov/resources/cutehip.pdf.
- Modified OpenHIP 0.7 Retrieved February 3, 2013, from http://www.cs.helsinki.fi/u/ hforsgre/openhip.
Paper Citation
in Harvard Style
K.C. A., Forsgren H., Grahn K., Karvi T. and Pulkkis G. (2013). IBE Extension for HIP . In Proceedings of the 10th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2013) ISBN 978-989-8565-64-8, pages 44-52. DOI: 10.5220/0004601700440052
in Bibtex Style
@conference{wosis13,
author={Amir K.C. and Harri Forsgren and Kaj Grahn and Timo Karvi and Göran Pulkkis},
title={IBE Extension for HIP},
booktitle={Proceedings of the 10th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2013)},
year={2013},
pages={44-52},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004601700440052},
isbn={978-989-8565-64-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2013)
TI - IBE Extension for HIP
SN - 978-989-8565-64-8
AU - K.C. A.
AU - Forsgren H.
AU - Grahn K.
AU - Karvi T.
AU - Pulkkis G.
PY - 2013
SP - 44
EP - 52
DO - 10.5220/0004601700440052