Method of distributed modular exponentiation on IoT terminal microcontrollers with protected involvement of cloud computing

Authors

DOI:

https://doi.org/10.18372/2073-4751.78.18966

Keywords:

modular exponentiation, open key cryptography, security of IoT, digital signature

Abstract

The method of distributed modular exponentiation on IoT terminal microcontrollers with secure involvement of remote computer systems is theoretically justified, developed and researched, the use of which allows to accelerate the implementation of this basic operation of public key cryptography.

Acceleration is achieved by reducing the computing load on the terminal computing platform. The paper theoretically substantiates this possibility by increasing the load on cloud computing, provides a detailed description of the method, the work of which is illustrated by a numerical example, and presents a detailed assessment of efficiency.

Theoretically and experimentally shown. that the proposed method allows to speed up modular exponentiation by 3-4 times compared to known methods of its implementation on IoT terminal devices with the involvement of cloud computing.

References

Kumar S., Tiwari P., Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data. 2019. No. 6. P.63–71.

Русанова О. В., Гайдукевич М. А., Міратаеї А. Метод безпечного розподіленого обчислення модулярної експоненти для прискорення реалізації механізмів захисту даних в ІoТ. Проблеми автоматизації та управління. 2023. Т. 4, № 76. С. 74–87.

Markovskyi O. et al. Secure Modular Exponentiation in Cloud Systems. The Congress on Information Technology, Computational and Experimental Physics (CITCEP 2015) : proceedings, 18–20 December 2015, Krakow, Poland / P. 266–269.

Menezes A. et al. Handbook of Applied Cryptography. Boca Raton : CRC Press, 2001. 780 p.

Bardis N. Secure, Green Implementation of Modular Arithmetic Operations for IoT and Cloud Applications. Green IT Engineering: Components, Networks and System Implementation / ed. by V. Kharchenko, Y. Kondratenko, J. Kacprzyk. Cham, 2017. P. 43–64.

Bardis N., Markovskyi O. Secure Implementation of Modular Exponentiation on Cloud Computing Resources. International Conference Applied Mathematics, Computational Science and Systems Engineering (AMCSE 2017) : proceedings, 06–08 October 2017, Athens, Greece / P. 90–96.

Borges J. et al. A Secure Cloud Computing Method for Rapid Implementation of Cryptographic Data Protection in IoT. 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) : proceedings, Athens, Greece, 13–15 October 2023 / IEEE. 2023. P. 50–53.

Unal D., Ali-Ali A., Catak F. O. A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer Systems. 2021. V. 125. P. 433–445.

Jialing Chen, Jiancheng Wang. The impact of broadband speed on innovation: City-level evidence from China. Heliyon. 2023. Vol. 9, no. 1. e12692.

Published

2024-07-01

Issue

Section

Статті