Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
•
26 Jul 2010
TL;DR: A thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using the library handcrafted to support ECC on embedded systems give implementers a useful guide for weighing security versus performance and justifies the need for new authentication methods, requiring less communication overhead.
Abstract: With the strong advent of mobile and embedded devices communicating in a wireless way using the air inter-face, the need for secure connections, efficient en- and decryption and strong authentication becomes more and more pronounced. The Transport Layer Security (TLS) protocol provides a convenient and well researched way to establish a secure authenticated connection between 2 communicating parties. By utilizing Elliptic Curve Cryptography (ECC) instead of the more common RSA algorithms, asymmetric cryptography is feasible even for tiny integrated devices. However, when dealing with heavily resource constrained appliances, it does not suffice to speed up just the cryptography related computations, but to also keep the communication necessary to establish a secure connection to a minimum, in order not to drain the scarce energy resources of the small devices. In this work we give a thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using our own library handcrafted to support ECC on embedded systems. The results give implementers a useful guide for weighing security versus performance and also justifies the need for new authentication methods, requiring less communication overhead.
5 citations
••
03 Aug 2020TL;DR: A split TLS processing architecture for TCP that handles TCP connection setup and TLS handshake on NIC while carrying out the remaining operations in the CPU-based host stack is envisioned.
Abstract: Transport Layer Security (TLS) has become a key building block for private network communication in modern Internet. While recent advancement of CPU has substantially improved the data encryption performance, TLS key exchange still remains the bottleneck for short-lived transactions. Dedicated hardware crypto accelerators promise good performance, but they often require invasive modification of the application due to its inherent architecture of asynchronous processing. In this paper, we explore a potential for offloading TLS handshake to network interface cards (NICs) with a hardware crypto accelerator. We envision a split TLS processing architecture for TCP that handles TCP connection setup and TLS handshake on NIC while carrying out the remaining operations in the CPU-based host stack. We present our rationale for the design and discuss a set of challenges towards our goal. Our proof-of-concept implementation on existing SmartNIC shows a promising result as it brings 5.9x throughput improvement than that of a single CPU core.
5 citations
••
5 citations
••
TL;DR: The evaluation of iMAC shows that it provides significant gains in throughput in comparison with uninformed channel selection, especially when contention for channel bandwidth is neither too low nor too high; intelligent selection of channels by iMAC is necessary to harness available bandwidth resources in the presence of medium levels of contention.
Abstract: Trends in wireless networks are increasingly pointing towards a future with multi-hop networks deployed in multi-channel environments. In this paper, we present the design for iMAC—a protocol targeted at Medium Access Control in such environments. iMAC uses control packets on a common control channel to facilitate a three-way handshake between the sender and the receiver for every packet transmission. This handshake enables the sender and the receiver to come to a consensus on a channel to use for data transmission and also signals to neighboring nodes about the contention on that channel. iMAC then uses a mechanism similar to 802.11 for data communication. Our evaluation of iMAC shows that it provides significant gains in throughput in comparison with uninformed channel selection, especially when contention for channel bandwidth is neither too low nor too high; intelligent selection of channels by iMAC is necessary to harness available bandwidth resources in the presence of medium levels of contention. Copyright © 2011 John Wiley & Sons, Ltd.
5 citations
••
28 Aug 2006TL;DR: This paper considers a secret handshake model with multiple groups, where two users authenticate themselves to the other if and only if each one's memberships of multiple groups are equal.
Abstract: A privacy-preserving authentication model called secret handshake was introduced by Balfanz, Durfee, Shankar, Smetters, Staddon, andWong [1]. It allows two members of a same group to authenticate themselves secretly to the other whether they belong to a same group or not, in the sense that each party reveals his affiliation to the other only if the other party is also a same group member. The previous works focus on the models where each participant authenticates himself as a member of one group. In this paper, we consider a secret handshake model with multiple groups. In our model, two users authenticate themselves to the other if and only if each one's memberships of multiple groups are equal. We call this model secret handshake with multiple groups. We also construct its concrete scheme. Our scheme can easily deal with the change of membership. Even if a member is added to a new group, or deleted from the one that he belongs to, it is not necessary to change the memberships for the other groups that he belongs to.
5 citations