3 ECDH (Elliptic Curve Diffie-Hellman) Secure Key Exchange
3 ECDH (Elliptic Curve Diffie-Hellman) Secure Key Exchange
2. Key Generation:
3. Key Exchange:
Alice computes S = dA ⋅ Q B
Bob computes S = dB ⋅ Q A
112-bit security: ECDH (224-bit key) vs. RSA (2048-bit key) [2].
256-bit security: ECDH (521-bit key) vs. RSA (15360-bit key) [2].
Smaller keys reduce memory usage and bandwidth, critical for IoT
sensors and control units [3].
2. Computational Efficiency:
3. Energy Efficiency:
Relevance to IoT
1. Resource Constraints:
IoT devices (e.g., sensors, control units) often have limited memory (16–
64 KB) and processing power (16–80 MHz). ECDH’s compact
parameters (e.g., Curve25519 uses 32-byte keys) are ideal for these
environments.
2. Real-Time Communication:
NIST curves (e.g., P-256, P-384) and modern curves (e.g., Curve25519)
are widely adopted in protocols like TLS and Bluetooth Low Energy,
ensuring compatibility with IoT systems.
Security Considerations
1. Curve Selection:
2. Side-Channel Attacks:
Key Size 256 bits (128-bit security) 3072 bits (128-bit security)
Power
Lower (55 mW @ 48 MHz) Higher (172 mW @ 48 MHz)
Consumption
Related Papers
1. Tanksale, V. (2024). Efficient Elliptic Curve Diffie–Hellman Key Exchange for
Resource-Constrained IoT Devices. Electronics.
2. Mahto, D., & Yadav, D. K. (2017). RSA and ECC: A Comparative Analysis.
International Journal of Applied Engineering Research.
3. Gura, N., et al. (2004). Comparing Elliptic Curve Cryptography and RSA on
8-bit CPUs. CHES.
Conclusion
ECDH is crucial for secure communication in IoT, offering both efficiency and
security for resource-constrained devices. By leveraging optimized curves
(e.g., Curve25519) and standardized implementations, We can lower
computational and memory usage.