Cryptology ePrint Archive: Report 2005/296

A Key Establishment IP-Core for Ubiquitous Computing

Markus Volkmer and Sebastian Wallner

Abstract: A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the investigation and discussion of alternative solutions. We suggest a low hardware-complexity solution for authenticated symmetric key exchange, using a Tree Parity Machine Rekeying Architecture. An authenticated key exchange is formulated from within the tree parity machine interaction concept and requires only few transmissions. It averts a Man-In-The-Middle attack and the currently known attacks on the non-numbertheoretic on principle. A key exchange can be performed within a few milliseconds, given typical limited bandwidth wireless communication channels. A flexible rekeying functionality enables the exploitation of the achievable key exchange rates. Characteristics of a standard-cell ASIC design realization as IP-core in 0.18 micron CMOS-technology are evaluated.

Category / Keywords: secret-key cryptography / applications

Publication Info: One page longer submitted version of the one published in the Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks SUN'05

Date: received 29 Aug 2005, last revised 29 Aug 2005

Contact author: markus volkmer at tuhh de

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20050901:065432 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]