DOI QR코드

DOI QR Code

Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)

  • Alfarjat, Ahmad Hweishel A. (Applied Science Department, AlBalqa Applied University) ;
  • Hanumanthappa, J. (DoS in Computer Science, University Of Mysuru) ;
  • Hamatta, Hatem S.A. (Applied Science Department, AlBalqa Applied University)
  • 투고 : 2021.03.05
  • 발행 : 2021.03.30

초록

In this paper we study the problem of implementation of security issues of blue tooth, especially secure simple pairing, with the help of an efficient four user authenticated key (4UAK) for an elliptic curve cryptography (ECC). This paper also deals with the design, implement and performance evaluation of secure simple pairing (SSP) using an elliptic curve cryptography, such as Diffie Hellman protocol when four users are involved. Here, we also compute the best, worst and average case step counts (time complexities). This work puts forth an efficient way of providing security in blue tooth. The time complexity of O(n4) is achieved using Rabin Miller Primality methodology. The method also reduces the calculation price and light communication loads.

키워드

참고문헌

  1. Mr.Ahmad Hweishel A.Alfarjat, Dr.Hanumanthappa.J., Prof.H.S.Sheshadri.,A Mathematical model to the Security issues of Bluetooth using Elliptic Curve Cryptography: International Journal of Computer Applications (IJCA),vol.46,no.5,pp.7-15,ISSN:0975-8887.
  2. Mr.Ahmad Hweishel A.Alfarjat, Dr.Hanumanthappa.J., A Survey over the Security Issues of Bluetooth Using Elliptic Curve Cryptography (ECC) International Journal of Computer Applications (IJCA),vol.150,no.8,pp.14-17,ISSN:0975-8887.
  3. Mr.Ahmad Hweishel A.Alfarjat, Dr.Hanumanthappa.J., Prof.H.S.Sheshadri 2017.,Security issues of Bluetooth based on Digital Signature using Elliptic Curve Cryptography (SBECDSA):International Journal of Current Multidisciplinary Studies (IJCMS),vol.3,Issue.01,pp.1-7,ISSN:2455-3107. https://doi.org/10.4038/ijms.v3i2.1
  4. Mr.Ahmad Hweishel A.Alfarjat, Prof.H.S.Sheshadri.,Study of Elliptic Curve Cryptography (ECC) for Bluetooth Security:A review,in proceeding of the two days International Conference on "Advances in Colloborative Research for Economics,Management,Humanities,Social Sciences and Computer Technology",June-2016.
  5. Jr.Burton,S.Kaliski,elliptic curves and cryptography:A Pseudorandom bit generator and other tools,Ph.D thesis,MIT,USA,1988.
  6. Andrew S.Tanenbaum,"Computer Networks",Pearson Education Inc,FourthEdition,2003.
  7. Ellis Horowitz Sartaz Sahni,Sanguthevar rajasekaran,Computer Algorithms,Galgotia publication.
  8. Dr.Hanumanthappa.J.,Ahmed Hweishel A.Alfarjat,"Security issues of Bluetooth based on Digital Signature using Elliptic Curve Cryptography (SBECDSA)",InterNational Journal of Current Multidisciplinary Studies",Vol.1.,Issue.01,July-2017,pp:1-7.
  9. Hanumanthappa.J.,IPv6 over Bluetooth:Security Aspects,Issues and its Challenges,in proceedings of NCWNT-09,Nitte-574110,Karnataka,INDA-12-17,2009.
  10. W.Stallings,1998.Cryptography and Network Security:Principles and Practice,Prentice Hall,p 399-432.
  11. B.Miller and C.Bisdikian, Bluetooth revealed:The insiders guide an open specification for global wireless'communications.Prentice Hall 2000.
  12. Bluetooth SIG,http://www.Bluetooth.com.
  13. K.Rabah,Theory and Implementation of Elliptic Curve Cryptography,Journal of applied science.,5:604-633. https://doi.org/10.3923/jas.2005.604.633
  14. Hanumanthappa.J.,Ahmed Hweishel A.Alfarjat,Prof.H.S.Sheshadri,Implementation of Secure Simple Pairing using Bluetooth using elliptic curve cryptography,Dec-2017.
  15. Neal Koblitz ,elliptic curve cryptosystems,mathematics of computation,vol.48,pp.203-209,1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
  16. N Koblitz,A Course in number theory and cryptography,2nd ed,Graduate texts in mathematics,vol.114, springer 1994.
  17. I.F.Blake,G.Seroussi,N.P.Smart,2000.Elliptic Curves in Cryptography,volume 265 of London Mathematical society lecture notes series.Cambridge University Press,Cambridge.
  18. Keijo Haataja,Pekka Toivanen,2008.Practical Man in the Middle Attacks against Bluetooth Secure Simple Pairing,in Proceedings of the IEEE international Conference,pp:1-5.
  19. Huaizhi Li,Mukesh Singhal,2005.A Key establishment Protocol for Bluetooth Scatternets,In Proceedings of the 25th IEEE international conference on Distributed Computing Systems Workshops (ICDCSW'05).
  20. Jen-Ho Yang,Chin-Chen Chang,2009.An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile commerce environments,Journal of Systems and Software,82(9), pp:1497-1502. https://doi.org/10.1016/j.jss.2009.03.075
  21. E.Barker,D.Johnson and M.Smid,2007.Recommendation for Pair-Wise Key Establishment Schemes using Discrete Logarithm Cryptography.Speacial Publication 800-56A.National Institute of Standards and Technology.
  22. K.Jarvinen and J.Skytta,On parallelization of high speed processors for elliptic curve cryptography, IEEE Transactions on very large scale integration(vlsi) systems,16(9) (2008) 1162-1175. https://doi.org/10.1109/TVLSI.2008.2000728
  23. T.M.apostol,Introduction to analytic number theory,Springer verlag,New York,1976,Undergraduate texts in mathematics.
  24. A.O.L Atkin and F.Morain,Elliptic curves and Primality proving,Math.Comp 61(203),29-68,1993. https://doi.org/10.1090/S0025-5718-1993-1199989-X
  25. Darrel Hankerson,Alfred Menezes,Scott Vanstone,2003.Guide to Elliptic Curve Cryptography,Springer.
  26. Darrel Hankerson,Julio Lopez Hernandez,Alfred Menezes,2000.Software implementation of Elliptic Curve Cryptography over Binary Fields.
  27. Vincent Verneuil,2012.Elliptic Curve Cryptography and Security of embedded devices,Ph.D Thesis,pp:1-176.
  28. John Padgette,Karen Scarfone,Lily Chen,2012.Guide Bluetooth Security,National Institute of Standards and Technology,pp:1-39.
  29. Gustavo Padovan,2011.Bluetooth Security,University of Campinas-Brazil,pp:1-9.
  30. B.J.Birch,Cyclotomic fields and kummer extensions,In algebraic number theory,pp:85-93,Thomson,Washington,DC,1967.
  31. Gyozo Godor,Sandor imre,2011.Elliptic Curve Cryptography based Authentication protocol for Low-cost RFID tags,in proceedings of the IEEE international conference on RFID technologies and applications,pp:386-393.
  32. Jen-Ho Yang,Chin-Chen Chang,2009.An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile commerce environments,Journal of Systems and Software,82(9),pp:1497-1502. https://doi.org/10.1016/j.jss.2009.03.075
  33. Juan-Carlos Cano,David Ferrandez-Bell,Pietro Manzoni,2004:Evaluating Blue tooth Performance as the support for context aware applications in proceedings of the IEEE International Conference on ICCCN,pp:345-350.
  34. Duesne.S.,Fouotsa.E.,2012.Tate pairing computation on Jacobi's elliptic curves,Pairing-Based Cryptography,Pairings,LNCS Springer verlag,vol.7708,pp:254-269.
  35. E.DeWin,S.Mister,B.Preneel,M.Weiner,1998.On the Performance of Signature Schemes Based on Elliptic Curves.In Algorithmic Number Theory:3rd International Symposium,Springer Lecture notes in computer science,pp:252-266.
  36. T.Pornin,2013.Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm,pp:1-79.
  37. D.Poulakis,2011.Some lattice attacks on DSA and ECDSA,Applicable Algebra in Engineering Communication and Computing,vol.22,pp.347-358. https://doi.org/10.1007/s00200-011-0154-4
  38. Prashanth Rewagad,Yogita pawar,2013.Use of Digital Signature with Diffie Hellman Key exchange and AES encryption algorithm to enhance Data Security in Cloud Computing,in proceedings of the IEEE international conference on communication systems and network technologies,pp:437-439.
  39. Diego F.Aranha,Ricardo Dahab,2010.Efficient implementation of Elliptic Curve Cryptography in WSN's,Advances in Mathematics of Communications,vol.4,no.2,pp:169-187. https://doi.org/10.3934/amc.2010.4.169
  40. Hamish Silverwood,2007.A Matlab implementation of Elliptic Curve Cryptography,Summer Research Project
  41. J.H.Silverman,The neron-Tate height on elliptic curves,Ph D thesis,Hardvard University,1981.
  42. N.P.Smart.S-integral points on elliptic curves,Math proceedings.Cambridge philos.Soc.,116(3):391-399,1994. https://doi.org/10.1017/S0305004100072698
  43. L.C.Washington,2008.Elliptic Curves,Discrete Mathematics and its applications (BocaRaton).Chapman & hall/CRC,Boca Raton,FL,Second edition,Number theory and Cryptography.
  44. E.Bekyel,2004.The density of elliptic curves having a global minimal Weirstrass equation.J number theory,109(1):41-58. https://doi.org/10.1016/j.jnt.2004.06.003
  45. F.Brezing and A.Weng,2005.Elliptic Curves Suitable for pairing based Cryptography.Des codes Cryptogr.,37(1):133-141. https://doi.org/10.1007/s10623-004-3808-4
  46. C.Breuil,B.conrad,F.diamond.,R.Taylor,2001.On the modularity of elliptic curves over Q:wild 3-adic exercises.J.Amer.Math.Soc.,14(4):843-939 (electronic). https://doi.org/10.1090/S0894-0347-01-00370-8
  47. Pritam Gajkumar shah,Dr.Xu Huang,An enhancement of elliptical curve cryptography for the resource constrained wireless sensor networks,Ph.D thesis,University Of Canberra,2010.
  48. V.S.Miller,Use of elliptic curves in cryptography.In advances in cryptology-CRYPTO'85,vol,218 of lecture notes in comput.sci.,pages 417-426.Springer,Berlin,1986.
  49. J.S.Milne elliptic curves,Book surge publishers,Charleston,SC,2006.
  50. A.J.Menezes,P.C.van Oorschot and S.A.Vanstone,Handbook of Applied Cryptology.CRC press Series on Discrete Mathematics and its applications,FL,1997.
  51. Kenneth H.Rosen,Elliptic curves number theory and Cryptography,Second edition,Taylor and Francis group LLC,2008.
  52. Bundesamt fur Sicherheit in der informationstechnik,Technical guideline,Elliptical Curve Cryptography,version 2.0.
  53. J.H. Silverman,The arithmetic of elliptic curves,Graduate Text in Mathematics,vol 106,Springer,Berlin,1986.
  54. P.C.Kocher,Timing attacks on implementations of DH,RSA,DSS and other systems in:CRYPTO'96,in:Lecture notes in Comput.Sci.,vol.1109,Springer,Berlin,1996,pp.104-113.
  55. Xiaojiang Du,A routing driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks,IEEE Transactions on Wireless Communications,vol.8,no.3,March 2009.
  56. WhiteField Diffie,Martin.E.Hellman,New Directions in Cryptography,IEEE Transactions on Information Theory,Vol22,NO.6,Nov,1976.
  57. R.Merkle,Secure communication over an in secure channel,Communications of the ACM.
  58. D.Knuth,The Art of Computer Programming,Vol.2.,Semi numerical algorithms,Reading,MA.:Addison Wesley,1969.
  59. W.Diffie,M.E.Hellman,Multiuser cryptographic technique,presented at National Computer Conference,New York,June 7-10,1976.
  60. A.V.Aho,J.E.Hopcroft and J.D.Ullman,The Design and Analysis of Computer Algorithms,Reading,MA.:Addison Wesley,1974.
  61. J.Hanumanthappa,"IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:-A Case Study for University of Mysore Network",International Journal of Computer Science and Information Security,vol.3.,No.1.,2009,pp 1-12. https://doi.org/10.1504/IJICS.2009.026619
  62. J.Hanumanthappa(2014),"DW&C:Dollops Wise Curtail IPv4/IPv6 Transition Mechanism Using NS2",International Journal Of Engineering Trends and Technology (IJETT),Vol.14,No.6.,pp 271-279. https://doi.org/10.14445/22315381/IJETT-V14P253
  63. J.Hanumanthappa,2009,An Overview of Study on Smooth Porting process scenario during IPv6Transition (TIPv6),in Proceedings of IEEE IACC-09,Patiala,Punjab,INDIA-6-7,March-2009,pp 2217-2222.
  64. J.Hanumanthappa,"An Innovative Simulation,Comparison Methodology & Framework for evaluating the Performance evaluation metrics of a Novel IPv4/IPv6 Transition Mechanisms:BDSIIT vs.DSTM,in proceedings of the IEEE First International Conference on Integrated Intelligent Computing(ICIIC2016),SJBIT,Bengaluru,pp 258-263.
  65. J.Hanumanthappa(2011),A Simulation study on the performance of divide- and-conquer based IPv6 Address LPR in BD-SIIT IPv4/IPv6 transition using a Novel Reduced Segment Table(RST) algorithm in BD-SIIT Translator,Proceedings of International Conference on Computer's and Computing(ICCC'11),Lanzarote,Canary Islands,Spain(ISBN:978-1-61804-0008).
  66. J.Hanumanthappa,AbdulMalek Maresh Hassan Ali (2017),Quad Tree Based Static Multi Hop Leach Energy Efficient Routing Protocol:A Novel Graph Theoretic approach, International Journal of Computer Network and Communications(IJCNC),Vol.10.No.8,pp 1-21.
  67. J.Hanumanthappa,Ahmed Weishel A.Alfarjat,Prof.Sheshadri.H.S (2017),"Mathematical Modeling of Security Issues of WLAN's using Space Time Processing in DSP", International Journal of Computer Science and Information Security (IJCSIS),Vol.15.No.8,pp 320-330.
  68. J.Hanumanthappa(2015),"Investigations Into The Design, Performance And Evaluation Of A Novel Energy Efficient Multipath Routing Algorithms in Wireless Sensor Networks", in Proceedings of National Conference on Computer Science and its Applications (NCCSA),Dept of CS, Shri Shiradi Saibaba College of Engineering,Bengaluru.
  69. J.Hanumanthappa,Abdulmalek Maresh Hasan Ali(2017),"Comparison and Contrast between the performance issues of mDBR and mCoDBR novel cooperative routing protocols in under water sensor networks (UWSN's)", in International Journal Of Research Science,Engineering Technology (IJRSET),pp 21-28.
  70. J.Hanumanthappa,Abdulmalek Maresh Hasan Ali(2017)," Node multi homing based policy routing using Mobile IPv6 in ns2",in proceedings of the national conference on advanced information technology (NCAIT),SJBIT,Bengaluru,pp 169-175.
  71. J.Hanumanthappa(2015),"Mathematical Modeling of K-CCP Protocol of Coverage and Connectivity in wireless sensor networks",in Proceedings of the National Conference on Computer Science and its Applications (NCCSA),Dept of CS,Shri Shiradi Saibaba College of Engineering,Bengaluru.
  72. J.Hanumanthappa(2015),"Performance and Evaluation of an Intra Cluster and Inter Cluster Novel Graph Theoretic Routing Algorithm (GTRA) in MANET's", in proceedings of the UGC Sponsored State Level Conference on Next-Gen Computing (NGC):Challenges and Opportunities,Post Graduate Department of Computer Science,SBRR Maha Jana First Grade College,pp109-115.
  73. J.Hanumanthappa(2015),"Comparison and Contrast between the Performance issues of T-SEP and E-SEP in Energy Efficient Wireless Sensor Networks (EFWSN's)", in proceedings of the UGC Sponsored State Level Conference on Next-Gen Computing (NGC-2015):Challenges and Opportunities,Post Graduate Department of Computer Science,SBRR Maha Jana First Grade College,pp 89-101.