PGP in constrained wireless devices

作者: Darrel Hankerson , Michael Kirkup , Michael Brown , Alfred Menezes , Donny Cheung

DOI:

关键词: Operating systemInteroperabilityEmail encryptionPortingBandwidth (computing)Elliptic curve cryptographyComputer scienceWirelessPagerComputer networkUser interface

摘要: The market for Personal Digital Assistants (PDAs) is growing at a rapid pace. An increasing number of products, such as the PalmPilot, are adding wireless communications capabilities. PDA users now able to send and receive email just they would from their networked desktop machines. Because inherent insecurity environments, system needed secure communications. requirements security will likely be influenced by constraints PDA, including limited memory, processing power, bandwidth, user interface. This paper describes our experience with porting PGP Research in Motion (RIM) two-way pager, incorporating elliptic curve cryptography into PGP's suite public-key ciphers. Our main conclusion that viable solution providing interoperable between constrained devices

参考文章(27)
Alma Whitten, J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of PGP 5.0 usenix security symposium. pp. 14- 14 ,(1999)
Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes public key cryptography. pp. 446- 465 ,(2000) , 10.1007/978-3-540-46588-1_30
Deborah Russell, Simson Garfinkel, PGP: Pretty Good Privacy ,(1994)
Neil Daswani, Dan Boneh, Experimenting with Electronic Commerce on the PalmPilot financial cryptography. pp. 1- 16 ,(1999) , 10.1007/3-540-48390-X_1
Preda Mihailescu, F Pappalardi, Elliptic Curves in Cryptography ,(1999)
Michael J. Wiener, Robert J. Zuccherato, Faster Attacks on Elliptic Curve Cryptosystems selected areas in cryptography. pp. 190- 200 ,(1998) , 10.1007/3-540-48892-8_15
Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui, A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer public key cryptography. pp. 182- 194 ,(1998) , 10.1007/BFB0054024
Steven D. Galbraith⋆, Nigel P. Smart, A cryptographic application of Weil descent Lecture Notes in Computer Science. pp. 191- 200 ,(1999) , 10.1007/3-540-46665-7_23
Richard Schroeppel, Hilarie Orman, Sean O’Malley, Oliver Spatscheck, Fast Key Exchange with Elliptic Curve Systems international cryptology conference. pp. 43- 56 ,(1995) , 10.1007/3-540-44750-4_4