Method of distributed modular exponentiation on IoT terminal microcontrollers with protected involvement of cloud computing
DOI:
https://doi.org/10.18372/2073-4751.78.18966Keywords:
modular exponentiation, open key cryptography, security of IoT, digital signatureAbstract
The method of distributed modular exponentiation on IoT terminal microcontrollers with secure involvement of remote computer systems is theoretically justified, developed and researched, the use of which allows to accelerate the implementation of this basic operation of public key cryptography.
Acceleration is achieved by reducing the computing load on the terminal computing platform. The paper theoretically substantiates this possibility by increasing the load on cloud computing, provides a detailed description of the method, the work of which is illustrated by a numerical example, and presents a detailed assessment of efficiency.
Theoretically and experimentally shown. that the proposed method allows to speed up modular exponentiation by 3-4 times compared to known methods of its implementation on IoT terminal devices with the involvement of cloud computing.
References
Kumar S., Tiwari P., Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data. 2019. No. 6. P.63–71.
Русанова О. В., Гайдукевич М. А., Міратаеї А. Метод безпечного розподіленого обчислення модулярної експоненти для прискорення реалізації механізмів захисту даних в ІoТ. Проблеми автоматизації та управління. 2023. Т. 4, № 76. С. 74–87.
Markovskyi O. et al. Secure Modular Exponentiation in Cloud Systems. The Congress on Information Technology, Computational and Experimental Physics (CITCEP 2015) : proceedings, 18–20 December 2015, Krakow, Poland / P. 266–269.
Menezes A. et al. Handbook of Applied Cryptography. Boca Raton : CRC Press, 2001. 780 p.
Bardis N. Secure, Green Implementation of Modular Arithmetic Operations for IoT and Cloud Applications. Green IT Engineering: Components, Networks and System Implementation / ed. by V. Kharchenko, Y. Kondratenko, J. Kacprzyk. Cham, 2017. P. 43–64.
Bardis N., Markovskyi O. Secure Implementation of Modular Exponentiation on Cloud Computing Resources. International Conference Applied Mathematics, Computational Science and Systems Engineering (AMCSE 2017) : proceedings, 06–08 October 2017, Athens, Greece / P. 90–96.
Borges J. et al. A Secure Cloud Computing Method for Rapid Implementation of Cryptographic Data Protection in IoT. 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) : proceedings, Athens, Greece, 13–15 October 2023 / IEEE. 2023. P. 50–53.
Unal D., Ali-Ali A., Catak F. O. A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer Systems. 2021. V. 125. P. 433–445.
Jialing Chen, Jiancheng Wang. The impact of broadband speed on innovation: City-level evidence from China. Heliyon. 2023. Vol. 9, no. 1. e12692.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.