This Article 
 Bibliographic References 
 Add to: 
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
February 2006 (vol. 5 no. 2)
pp. 128-143
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices—battery life—and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.

[1] US Department of Commerce, The Emerging Digital Economy II, II.htm , 1999.
[2] W.W.W. Consortium, The World Wide Web Security FAQ, , 1998.
[3] W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall, 1998.
[4] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
[5] LAN MAN Standards Committee of the IEEE CS, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification: IEEE standard 802.11, 1990.
[6] IPSec Working Group,, 2000.
[7] SSL 3.0 Specification,, 1996.
[8] Wireless Application Protocol 2.0— Technical White Paper, http:/, Jan. 2002.
[9] Compaq iPAQ Pocket PC, http:/, 2002.
[10] D.W. Carman, P.S. Kruus, and B.J. Matt, Constraints and Approaches for Distributed Sensor Security, Technical Report 00-010, Network Assoc. Labs, 2000.
[11] J. Goodman, A. Chandrakasan, and A. Dancy, “Design and Implementation of a Scalable Encryption Processor with Embedded Variable DC/DC Converter,” Proc. Design Automation Conf., pp. 855-860, June 1999.
[12] Z. Shi and R. Lee, “Bit Permutation Instructions for Accelerating Software Cryptography,” Proc. IEEE Int'l Conf. Application-Specific Systems, Architectures, and Processors, pp. 138-148, July 2000.
[13] J. Burke, J. McDonald, and T. Austin, “Architectural Support for Fast Symmetric-Key Cryptography,” Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems, pp. 178-189, Nov. 2000.
[14] N. Potlapally, S. Ravi, A. Raghunathan, and G. Lakshminarayana, “Optimizing Public-Key Encryption for Wireless Clients,” Proc. IEEE Int'l Conf. Comm., pp. 1050-1056, May 2002.
[15] S. Ravi, A. Raghunathan, N. Potlapally, and M. Shankaradass, “System Design Methodologies for Wireless Security Processing Platform,” Proc. Design Automation Conf., pp. 777-782, June 2002.
[16] D. Boneh and N. Daswani, “Experimenting with Electronic Commerce on the PalmPilot,” Proc. Financial Cryptography, pp. 1-16, Feb. 1999.
[17] W. Freeman and E. Miller, “An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems,” Proc. Int'l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm. Systems, pp. 348-357, Oct. 1999.
[18] S.K. Miller, “Facing the Challenges of Wireless Security,” Computer, pp. 46-48, July 2001.
[19] G. Apostolopoulos, V. Peris, P. Pradhan, and D. Saha, “Securing Electronic Commerce: Reducing the SSL Overhead,” IEEE Network, pp. 8-16, July 2000.
[20] D.S. Wong, H.H. Fuentes, and A.H. Chan, “The Performance Measurement of Cryptographic Primitives on Palm Devices,” Proc. Ann. Computer Security Applications Conf., pp. 92-101, Dec. 2001.
[21] S. Ravi, A. Raghunathan, and N. Potlapally, “Securing Wireless Data: System Architecture Challenges,” Proc. Int'l Symp. System Synthesis, pp. 195-200, Oct. 2002.
[22] A. Hodjat and I. Verbauwhede, “The Energy Cost of Secrets in Ad- Hoc Networks,” Proc. IEEE CAS Workshop Wireless Comm. and Networking, Sept. 2002.
[23] M. Jakobsson and D. Pointcheval, “Mutual Authentication for Low-Power Mobile Devices,” Proc. Financial Cryptography, pp. 178-195, Feb. 2001.
[24] D.S. Wong and A.H. Chan, “Mutual Authentication and Key Exchange for Low Power Wireless Communications,” Proc. IEEE Military Comm. Conf., pp. 39-43, Oct. 2001.
[25] Y.W. Law, S. Dulman, S. Etalle, and P.J.M. Havinga, Assessing Security-Critical Energy-Efficient Sensor Networks, Technical Report TR-CTIT-02-18, Univ. of Twente, The Netherlands, July 2002.
[26] R. Karri and P. Mishra, “Minimizing Energy Consumption of Secure Wireless Session with QoS Constraints,” Proc. Int'l Conf. Comm., pp. 2053-2057, May 2002.
[27] H. Feistel, “Cryptography and Computer Privacy,” Scientific Am., pp. 15-23, May 1973.
[28] K.H. Rosen, Elementary Number Theory and its Applications. Addison-Wesley Publishing Co., 1985.
[29] OpenSSL Project, http:/, 2001.
[30] Familiar Project, http:/, 2002.
[31] National Instruments Corp., http:/, 2001.
[32] A. Menezes, P.V. Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[33] V. Gupta, S. Gupta, S. Chang, and D. Stebila, “Performance Analysis of Elliptic Curve Cryptography for SSL,” Proc. ACM Workshop Wireless Security, pp. 87-94, Sept. 2002.
[34] J. Daemen and V. Rijmen, “Rijndael, the Advanced Encryption Standard,” Dr. Dobb's J., pp. 137-139, Mar. 2001.
[35] Y.L. Yin, “The RC5 Encryption Algorithm: Two Years On,” RSA Laboratories' Cryptobytes, vol. 2, pp. 14-15, 1997.
[36] SSLdump Project, http://www.rtfm.comssldump/, 2002.
[37] A.K. Lenstra and E.R. Verheul, “Selecting Cryptographic Key Sizes,” J. Cryptology: J. Int'l Assoc. for Cryptologic Research, vol. 14, no. 4, pp. 255-293, 2001.
[38] Counterpane Internet Security: Crypto-Gram Newsletter, http://www.counterpane.comcrypto-gram.html , 2002.

Index Terms:
Index Terms- 3DES, AES, cryptographic algorithms, DES, Diffie-Hellman, DSA, ECC, embedded system, energy analysis, handheld, low-power, RSA, security, security protocols, SSL.
Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006, doi:10.1109/TMC.2006.16
Usage of this product signifies your acceptance of the Terms of Use.