scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings Article
26 Jul 2010
TL;DR: A thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using the library handcrafted to support ECC on embedded systems give implementers a useful guide for weighing security versus performance and justifies the need for new authentication methods, requiring less communication overhead.
Abstract: With the strong advent of mobile and embedded devices communicating in a wireless way using the air inter-face, the need for secure connections, efficient en- and decryption and strong authentication becomes more and more pronounced. The Transport Layer Security (TLS) protocol provides a convenient and well researched way to establish a secure authenticated connection between 2 communicating parties. By utilizing Elliptic Curve Cryptography (ECC) instead of the more common RSA algorithms, asymmetric cryptography is feasible even for tiny integrated devices. However, when dealing with heavily resource constrained appliances, it does not suffice to speed up just the cryptography related computations, but to also keep the communication necessary to establish a secure connection to a minimum, in order not to drain the scarce energy resources of the small devices. In this work we give a thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using our own library handcrafted to support ECC on embedded systems. The results give implementers a useful guide for weighing security versus performance and also justifies the need for new authentication methods, requiring less communication overhead.

5 citations

Proceedings ArticleDOI
03 Aug 2020
TL;DR: A split TLS processing architecture for TCP that handles TCP connection setup and TLS handshake on NIC while carrying out the remaining operations in the CPU-based host stack is envisioned.
Abstract: Transport Layer Security (TLS) has become a key building block for private network communication in modern Internet. While recent advancement of CPU has substantially improved the data encryption performance, TLS key exchange still remains the bottleneck for short-lived transactions. Dedicated hardware crypto accelerators promise good performance, but they often require invasive modification of the application due to its inherent architecture of asynchronous processing. In this paper, we explore a potential for offloading TLS handshake to network interface cards (NICs) with a hardware crypto accelerator. We envision a split TLS processing architecture for TCP that handles TCP connection setup and TLS handshake on NIC while carrying out the remaining operations in the CPU-based host stack. We present our rationale for the design and discuss a set of challenges towards our goal. Our proof-of-concept implementation on existing SmartNIC shows a promising result as it brings 5.9x throughput improvement than that of a single CPU core.

5 citations

Journal ArticleDOI
TL;DR: The evaluation of iMAC shows that it provides significant gains in throughput in comparison with uninformed channel selection, especially when contention for channel bandwidth is neither too low nor too high; intelligent selection of channels by iMAC is necessary to harness available bandwidth resources in the presence of medium levels of contention.
Abstract: Trends in wireless networks are increasingly pointing towards a future with multi-hop networks deployed in multi-channel environments. In this paper, we present the design for iMAC—a protocol targeted at Medium Access Control in such environments. iMAC uses control packets on a common control channel to facilitate a three-way handshake between the sender and the receiver for every packet transmission. This handshake enables the sender and the receiver to come to a consensus on a channel to use for data transmission and also signals to neighboring nodes about the contention on that channel. iMAC then uses a mechanism similar to 802.11 for data communication. Our evaluation of iMAC shows that it provides significant gains in throughput in comparison with uninformed channel selection, especially when contention for channel bandwidth is neither too low nor too high; intelligent selection of channels by iMAC is necessary to harness available bandwidth resources in the presence of medium levels of contention. Copyright © 2011 John Wiley & Sons, Ltd.

5 citations

Book ChapterDOI
28 Aug 2006
TL;DR: This paper considers a secret handshake model with multiple groups, where two users authenticate themselves to the other if and only if each one's memberships of multiple groups are equal.
Abstract: A privacy-preserving authentication model called secret handshake was introduced by Balfanz, Durfee, Shankar, Smetters, Staddon, andWong [1]. It allows two members of a same group to authenticate themselves secretly to the other whether they belong to a same group or not, in the sense that each party reveals his affiliation to the other only if the other party is also a same group member. The previous works focus on the models where each participant authenticates himself as a member of one group. In this paper, we consider a secret handshake model with multiple groups. In our model, two users authenticate themselves to the other if and only if each one's memberships of multiple groups are equal. We call this model secret handshake with multiple groups. We also construct its concrete scheme. Our scheme can easily deal with the change of membership. Even if a member is added to a new group, or deleted from the one that he belongs to, it is not necessary to change the memberships for the other groups that he belongs to.

5 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877