Performance evaluation of public-key cryptosystem operations in WTLS protocol

@article{Levi2003PerformanceEO,
  title={Performance evaluation of public-key cryptosystem operations in WTLS protocol},
  author={Albert Levi and Erkay Savaş},
  journal={Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003},
  year={2003},
  pages={1245-1250 vol.2}
}
  • A. Levi, E. Savaş
  • Published 23 September 2003
  • Computer Science
  • Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003
WTLS (wireless transport layer security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handshake between mobile client and WAP gateway (server). Several cryptosystems at different key strengths can be used in WTLS. The trade-off is security versus processing and transmission time. In this paper, an analytical performance model for public-key cryptosystem operations in WTLS protocol is developed. Different… 

Figures and Tables from this paper

Performance evaluation of WTLS handshake protocol using RSA and elliptic curve cryptosystems
TLDR
Simulation results show that ECC has better processing time performance than RSA, and server queue delay does not seem to be bottleneck for mutual authenticated WTLS handshake using ECC certificates with prime curve parameters.
Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
TLDR
An analytical performance model of the WTLS handshake protocol when using the two public key cryptosystems, RSA and Elliptic Curve Cryptography is derived providing experimental evidence that ECC indeed outperforms RSA in realistic wireless secure scenarios.
Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol
TLDR
This paper implemented the protocols and necessary crypto primitives in both wireless handheld device and server and showed that Elliptic Curve Cryptosystems (ECC) perform better than RSA cryptosystem, and it is possible to use ECC key sizes larger than the ones proposed in the WTLS standard without significant performance degradation.
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
TLDR
A systematic analysis and performance comparison between the pre-shared key exchange mechanisms and the standard publicKey Exchange mechanisms in TLS is presented and the interaction between the overall TLS handshake duration and the network environment is evaluated.
Comparison Studies between Pre-Shared key and Public Key Exchange Mechanisms for Transport Layer Security (TLS)
TLDR
A systematic analysis and performance comparison between the pre-shared key Exchange mechanisms and the standard public key exchange mechanisms in TLS is presented and the interaction of the overall TLS handshake duration and the network environment is evaluated.
Comparative analysis of authentication techniques to Secure Low Level Reader Protocol (LLRP) connection
TLDR
This paper introduces RFID Access Control system (RFID-AC) as approach and assesses its security vulnerabilities and experimentally implements TLS LLRP endpoints and examines different possible security solutions.
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
TLDR
An efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC) is proposed, referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network.
The application of elliptic curve cryptosystem in wireless communication
  • Jia Xiangyu, Wang Chao
  • Computer Science
    2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications
  • 2005
TLDR
A comparison of ECC and RSA is given to show how better the ECC is for the wireless communication.
Layer-wise Security Schemes with Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks
TLDR
A secure, robust newly developed routing protocol, namely SNAuth_SPERIPv2, based on a Bellman Ford algorithm is introduced, which can be widely used in heterogeneous Next-Generation Networks (NGNs) on the inter-domain routing for un-trustworthy environment.
Optimization schemes for privacy key management protocol at WIMAX network
TLDR
This article studied PKMv2 and PLMv1 and proposed schemes such as applying digital license OMAC and WTLS to increase and improve security and also as for applying ECC for security problems in wireless networks such as authentication, signature and key exchange that proposed use of ECC instead RSA.
...
...

References

SHOWING 1-10 OF 13 REFERENCES
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
Transport layer security: how much does it really cost?
  • G. Apostolopoulos, V. Peris, D. Saha
  • Computer Science
    IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)
  • 1999
TLDR
This paper benchmarks two of the more popular Web servers that are in use today and finds that they are a couple of orders of magnitude slower when it comes to serving secure Web pages, and suggests two modifications to the SSL protocol that reduce the latency as well as increase the throughput at the server.
Securing electronic commerce: reducing the SSL overhead
TLDR
It is shown that the overheads due to SSL can make Web servers slower by a couple of orders of magnitude, and the reason for this deficiency is investigated by instrumenting the SSL protocol stack with a detailed profiling of the protocol processing components.
Elliptic curve cryptosystems
TLDR
The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Performance of WTLS and Its Impact on an M-commerce Transaction
TLDR
Simulation-based performance measurements of the Wireless Transport Layer Security (WTLS) protocol are presented and its impact on an exemplary m-commerce transaction is discussed.
Elliptic curve cryptosystems IEEE Standard specifications for public-key cryptography
  • Mathematics of Computation
  • 1363
Wireless Application Protocol Architecture Specification, WAP-210-WAPArch-200100712-a, 12-July- 2001 version, latest version is available at http
  • WAP Forum
IEEE Standard specifications for public-key cryptography, IEEE Std
  • IEEE Standard specifications for public-key cryptography, IEEE Std
  • 1363
Performance Evaluation of the WAP Security Protocols
  • 2001
...
...