RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs

A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and ECC El Gamal Threshold Cryptography (ECCEG-TC) implementation. Through our implementation, we have put explored possibility of using RSA-TC and ECCEG-TC in MANETs. Finally, we compare RSA-TC and ECCEG-TC results and suggest why RSA-TC is unsuitable while ECCEGTC is suitable for MANETs. Keywords—Threshold Cryptography, ECCEG-TC, RSA-TC

[1]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[2]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[3]  Gilles Brassard,et al.  Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.

[4]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[5]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[6]  Jeong Hyun Yi,et al.  On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[7]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[8]  Levent Ertaul,et al.  ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I) , 2005, NETWORKING.

[9]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[10]  L. Ertaul,et al.  Security of ad hoc networks and threshold cryptography , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.

[11]  Joonsang Baek,et al.  Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[12]  W.A. Arbaugh Wireless Security Is Different , 2003, Computer.

[13]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.