Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU

نویسندگان

  • Tony Cheneau
  • Aymen Boudguiga
  • Maryline Laurent-Maknavicius
چکیده

Cryptographically Generated Addresses (CGA) are today mainly used with the Secure Neighbor Discovery Protocol (SEND). Despite CGA generalization, current standards only show how to construct CGA with the RSA algorithm and SHA-1 hash function. This limitation may prevent new usages of CGA and SEND in mobile environments where nodes are energy and storage limited. In this paper, we present the results of a performance and security study of the CGA and SEND. To significantly improve the performances of the CGA, we investigate first replacing RSA with ECC (Elliptic Curve Cryptography) and ECDSA (Elliptic Curve DSA), and second using the General-Purpose computing on Graphical Processing Units (GPGPU). Finally, a performance comparison between different hash algorithms (SHA-256, WHIRLPOOL,...) allows to prepare a better transition for the CGA when SHA-1 will be deprecated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Optimization of Cryptographically Generated Addresses

The need for nodes to be able to generate their own address and verify those from others, without relying on a global trusted authority, is a well-known problem in networking. One popular technique for solving this problem is to use self-certifying addresses that are widely used and standardized; a prime example is cryptographically generated addresses (CGA). We re-investigate the attack models...

متن کامل

Prediction of Engineered Cementitious Composite Material Properties Using Artificial Neural Network

Cement-based composite materials like Engineered Cementitious Composites (ECCs) are applicable in the strengthening of structures because of the high tensile strength and strain. Proper mix proportion, which has the best mechanical properties, is so essential in ECC design material to use in structural components. In this paper, after finding the best mix proportion based on uniaxial tensile st...

متن کامل

Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area

The mobile ad hoc network (MANET) has attracted a lot of attention due to the characteristic of an infrastructure-less construction and multi-hop communication. In MANET, security is major issue, hackers has aimed to disrupt security in the form of IP spoofing or to produce a forged route. In the advancement of networks to IP version 6, appreciating the same protocol would guarantee the achieve...

متن کامل

Security Extensions to MMARP Through Cryptographically Generated Addresses

The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially designed without taking into account security concerns. In this paper we propose some extensions to protect the protocol against spoofing and forging attacks. Our solution, based on cryptographically generated addresses an...

متن کامل

Method of Production and Assessment of an Encapsulated Choline Chloride and Its Effects on Growth Performanc and Serum Lipid Indices in Broilers

Since, choline chloride caking causes serious operating difficulties and customer complaints, two experiments were conducted to optimize in vitro production of a novel encapsulated choline chloride (ECC) with minimum hygroscopic property and optimize delivery in gastrointestinal tract (GIT). The in vivo verification test of ECC was used to compare it with the commercial choline chloride (CC) in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2010