Next Article in Journal
Robust Data Augmentation for Neural Machine Translation through EVALNET
Previous Article in Journal
Cost-Sensitive Laplacian Logistic Regression for Ship Detention Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining

by
Daniel Ioan Hunyadi
*,†,
Oana-Adriana Ticleanu
and
Nicolae Constantinescu
Faculty of Science, Department of Mathematics and Informatics, Lucian Blaga University of Sibiu, 550012 Sibiu, Romania
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2023, 11(1), 122; https://doi.org/10.3390/math11010122
Submission received: 28 October 2022 / Revised: 30 November 2022 / Accepted: 22 December 2022 / Published: 27 December 2022
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
Mathematical models based on elliptic curves have been intensively studied since their applicability in data security systems was discovered. In this article, the authors describe the optimal way to select particular subspaces over which elliptic curves are defined, showing the applicability of these subspaces in secure data transfer. Access to large databases and analyses of the requests made to these databases are required daily by a variety of users, including legal entities. An attack on these communication systems causes violations in privacy and damage to/theft of data that can be worth EUR tens of billions annually. For requests made between computers, encryption methods can be used as these systems have adequate computing power and energy. For requests made from fixed and mobile systems, if the data are distributed heterogeneously, the computing power required to authenticate both the users and the answering entities determines the efficiency of the proposed solution. To address this limitation, our study proposes a double-authentication method based on particular elliptic-curve systems.
MSC:
11G05; 11G07; 14H52

1. Introduction

In order to ensure the confidentiality of a request querying a complex database, techniques to authenticate the initiator and the answering entity and to encrypt the communication channel have been developed. Authentication based on the RSA-type digital signature—the Rivest, Shamir, and Adleman-based algorithm—was initially used ([1]). However, the power required to compute the parameters involved in this process increased with an increase in the length of the encryption keys. For a fixed computing system (computers and servers), the required power is provided by the involved entities; therefore, in the event that a request is made from and to a fixed computing system, the required computing power for the authentication protocols and for the communication encryption is provided by the query requester(s) and by the systems that store these distributed databases. In contrast, for mobile systems, energy consumption becomes an essential limiting factor; to address this limitation, we adopted elliptic-curve cryptography (ECC) as the solution for processes that require user authentication (as in [2], or quantum type on [3]). In the particular case of querying complex databases consisting of structures that are stored on several heterogeneous systems, as well as on physical structures and software, existing studies have proposed implementable solutions for each subcategory of case studies. In this sense, new solutions or their optimizations have continuously been illustrated, and the vulnerabilities of existing solutions have been highlighted. For the queries mentioned above, in situations in which an intelligent answer is necessary, only data mining ( D M ) techniques can be used. These intelligent answers are answers that actually provide an analysis of complex databases and algorithms and highlight certain aspects in their conclusions. More precisely, for situations where databases are heterogeneous complexes (that is, of different types and sizes), the data are stored heterogeneously (that is, on several types of computing systems, which can be personal computers, high-power computers, servers, and even mobile systems); we call these systems heterogeneous database systems ( H D B S s ). For HDBSs, an analysis does not yield only an individual answer—for example, finding not only some records that meet certain conditions but also some items with certain properties that are correlated with other items—and can provide a conclusion based on the correlation of several analyses comparing several databases. In situations where a query would be made from a mobile system to an H D B S -type system, the use of an algorithm from the RSA–C category would require a computing power that consumes more energy than is available.
The solution proposed by the authors comes from their experience and expertise gained from research projects and government contracts. The proposed method addresses the case where a query, which involves D M , needs to be made from a mobile system with an H D B S -type structure. A variant of this method was implemented in a functional system and used within an institutional entity.

2. Existing Solutions for Related Problems

In this section, we briefly describe the existing solutions for problems related to authentication models between systems that involve multiple authentications. The difference between cases solved by other solutions and the case treated by our proposed solution is also described.
Starting from the basic advantage of ECC-type communication security systems, solutions that implement authentication models have been developed, such as the one in [4,5]; communication confidentiality systems, such as those developed in [6,7,8]; and analysis models of their limits, also described in [9,10,11,12]. These models are based on an essential property of ECC systems, namely, the size difference of the cryptographic credentials used in the systems based on elliptic curves, compared with those of systems based on RSA-type models and their variants. This translates into the number of calculations required to create the cryptographic primitives as well as the transformation from plain text to encrypted text for messages that need to be protected against attacks in order to be transmitted on public communication channels.
Numerous studies on authentication and secure communication have been carried out, and more are underway, both within university research laboratories and within the research and development departments of large companies, to provide solutions regarding particular mathematical models that address concrete problems in applications of secure communication in the case of heterogeneous systems. The key models used can be classified into three categories, depending on the type of devices in which they are implemented:
1
Systems that are implemented for authentication and secured communications, in which the involved devices in the communication process are classified as servers and computers. In these cases, mathematical models and algorithms of the type described in [13,14] can be used. Particular variants of these solutions were implemented for this kind of model, by the authors, in such cases. For these models, the computing power required to compute the parameters involved in obtaining the cryptographic credentials can be assured by the devices in which they are implemented.
In the case studied by the authors, one of the restrictions is related to the computing power available for use in the process generating cryptographic credentials. Therefore, both the mathematical model used and the implemented algorithmic model must take this aspect into account.
2
Smart mobile system interconnections, in which unitary models are implemented to secure the communications. For this case, the computation of cryptographic credentials is ensured by a centralized system, and the mobile device uses the cryptographic primitives provided by a trusted party that manages the solution in a centralized way. Then, the mobile device has to use these parameters. Such models are described in [15,16]. The solution from [15] was proposed by a team that included one of the authors from the present study. This solution was implemented and is still being used.
In our studied case, the system is heterogeneous both from the point of view of the devices that are involved in the communication process and from the point of view of the security model for each of the groups of devices, with a solution being proposed for the case where the authentication will be carried out based on the parameters computed also by the mobile systems, with these devices generating their own cryptographic primitives.
3
Security models in which mobile devices are involved in the correlation with fixed systems, included in S O T A (Secure Online Transaction Algorithm)-type models. In these cases, three parties are involved: consumer, retailer, and financial credit company. Solutions in this sense can be studied in [17].
The solution proposed by the authors is for the case where the volume of data transmitted is much higher than that in the case described above and where it is necessary to reduce the risk of malicious users, which in the above case does not need to be treated.

3. Description of The Parameters from Our Proposed Solution

This section describes the elements that define the treated case, the limitations imposed by the problem that needs to be solved, and the method of hierarchization for all the entities of the treated system.
This study was carried out on an actual case in which an entity required a high degree of data security and communication confidentiality. We describe this case, first, by illustrating the components of this system. Let us take a heterogeneous set of computing systems, denoted as follows:
A set of
  • n S server-type computing systems, denoted by S = { S 1 , S 2 , . . . , S n S } ;
  • n C computers, denoted by C = { C 1 , C 2 , . . . , C n C } ;
  • n M mobile devices, denoted by M = { M 1 , M 2 , . . . , M n M } ;
  • n P smart mobile phones, denoted by P = { P 1 , P 2 , . . . , P n P } .
The aforementioned devices contain databases, with temporary databases stored in M and P , which means that the data will occasionally be transferred to specialized servers. The credentials required for the authentication and secure communications assurance systems are managed by a specialized device, called a trusted server ( T S ). The presented system is described in Figure 1.
All the above systems have ensured interconnections, but our proposed system involves different communication protocols, different types of physical communication, and different uptimes—the time during which they can be accessed. Let us denote the sets of communication types throughall systems as IS .
Let T = { S , C , M , P , α T S } , IS . Then, T represents an H D B S .
Let P i be a smart mobile phone that makes a query in T , where the result that will be provided involves an analysis of the whole T using DM algorithms. The data that pass between P i and T within the query request, as well as the result that T provides to P i , represent a communication that requires double authentication and confidentiality of the communicated data; this is the treated case.

4. Our Solution to Ensure Authorized Access

This section presents the logical scheme of the studied system, the types of involved devices, the abstraction of the proposed model, and the proposed mathematical model for the generation of subspaces that are used in cryptographic processes.
In order to access T ’s query service, a complete security process is required, through which P i proves its identity and the T system identifies itself as the one to which P i wants to connect. This is the process of a double authentication: P i towards T and T towards P i .
For the double-authentication technique, classic RSA-type algorithms can be used; such implementations require key lengths of 2048 bits for the involved security requests and the generation of keys on all computer systems within T for the treated case. For S , C , and M , this requirement can be fulfilled, but in the case of P , the computing power required to generate the asymmetric keys of RSA involves the consumption of energy that is not available on such systems. To solve this requirement, which represents a class of data and communication security subproblems in which the confidentiality requirement is of a high degree and computing systems with low energy resources are involved, an ECC-based system can be used. First, we determine the cases of communication requests, and, depending on the type of devices involved, the mutual authentication method (double authentication) of the systems starts a data transfer process.
Involved devices:
  • Case 1: sets from S , C , M and T S ;
  • Case 2: P , { A O T } , where A O T represents any other device type, including S , C , M , P , and T S .
For Case 1, the solution for the authentication was described in [15] and implemented, and it is still functional within a governmental entity. Let us describe the solution for Case 2.

4.1. Involved Device Authentication

In order to construct various types of quantiles of subspaces over which elliptic curves with cryptographic properties are defined, several studies have been carried out, among which we recommend [18,19,20,21,22,23]. From the authors’ previous studies for cases in which such subspaces were created for communication between devices with low computing power, i.e., smartphones, among those that demonstrated, in practice, superior results using models based on nonsupersingular elliptic curves, we recommend references [15,24] to interested readers. In order to define the number of subspaces required to obtain credentials in the double-authentication process for devices within T , we build a model necessary for the particular case studied.

4.2. Mathematical Model for the Proposed Solution

Starting from the general space described in [24], let the values be generated by a series of integrals based on the partitions defining subspaces ξ ( K s i ) , as follows:
ξ d φ 4 φ 3 τ 2 φ τ 3 1 | ξ |
where ξ represents the quantile considered from the curves series, K s i is a partition of integer values, and φ is the variable defined over the subspace ξ ( K s i ) and τ 2 , τ 3 constants and represents the credential parameters of the series.
For each partition, we define its inverse as an elliptic curve from which points that have cryptographic properties in the sense of defining the credentials needed in the process of computing the keys involved in double authentication can be selected. To build this credential system, two constants, ν 1 and ν 2 , as well as a periodic function defined over a set of real numbers, are selected. In the case considered in the current study, the Weierstrass equation for each ξ -partition is given by the following formula:
δ 2 = 4 δ 3 ν 1 δ ν 2 ξ
where ν 1 and ν 2 are constants, and ν 1 , ν 2 < ξ > .
The two values δ , δ define a point of this curve:
ι 2 = 4 φ 3 ν 1 φ ν 2 ξ
for which the possibility of being considered as a point with cryptographic properties is computed. These subsets are defined for each partition ξ of the above described system, thus obtaining a series of elliptic curves from which the points that will be part of the cryptographic algorithm are chosen.

5. Security Study of The Proposed Model

In this section, the security conditions of the proposed model are described.
Theorem 1.
The security condition, required by an H D B S system, is that the inequality
| ξ | > n S + n C + n M + n P
has to be fulfilled.
Proof of Theorem 1.
If two devices are considered, let use denote them by d i , d j < S , C , M , P > , where i j , with ξ i and ξ j , where the intersection of the partitions ξ i and ξ j is nonempty. According to [15,25], we have collisions in the process of establishing a cryptographic key required in step three of the communication protocols involved; therefore, < ξ i > < ξ j > = Ø .    □
This theorem highlights the fact that each quantile considered in the series of studied elliptic curves will need to be defined independently from the others, a fact that emerges from the graphic representation illustrated in Figure 2. The quantities have to be selected in such a way as to comply with the requirement < ξ i > < ξ j > = Ø .
Definition 1.
The elliptic curve corresponding to partition ξ i is represented by the sets of points of the form ( ϕ , ι ) Z μ × Z μ that meet the congruence conditions:
ι 2 ϕ 3 + ν 1 ϕ + ν 2 m o d μ ξ
and ι 2 = ϕ 3 + ν 1 ϕ + ν 2 , with ( ν 1 , ν 2 ) Z μ , where μ is a prime number greater than ( ξ 2 ) and the 4 ν 1 3 + 27 ν 2 2 0 ( m o d μ ) relation is satisfied, to which a special point O is added, called the point at infinity.
For the operations performed in order to compute the cryptographic parameters, using points selected from each quantile, optimizations of the standard computation methods are necessary for the involved operations, namely, for the specific addition of two such points and the multiplication of such a point by a scalar, in order to obtain the primary credentials. Among the optimal methods used in such operations, we can mention the studies in [26,27,28], where fundamental mathematical models with transformations of these modules and implementation optimizations in various private computing systems were described.

6. Implementation of the Proposed Model

This section illustrates the formulas used to compute the parameters of the subspaces over which the elliptic curves are defined, the graphic representation of these subspaces, and the computation algorithm proposed to compute these parameters.
For the implementations considered in the present case, we consider the optimal method of the type ϕ 3 = γ 2 ϕ 1 ϕ 2 , ι 3 = γ ( ϕ 1 ϕ 3 ) ι 1 , where
γ = ( ι 2 ι 1 ) ( ϕ 2 ϕ 1 ) 1 , f o r t h e c a s e t h a t t h e p o i n t s i n t h e o p e r a n d d i f f e r ( 3 ϕ 1 2 + a ) ( 2 ι 1 ) 1 , w h e n w e h a v e i d e n t i c a l p o i n t s
These operations are used to compute the intermediate points Q of coordinates ( ϕ 3 , ι 3 ) , using points P 1 of coordinates ( ϕ 1 , ι 1 ) and P 2 of coordinates ( ϕ 2 , ι 2 ) . In the case of this type of computation, it is necessary to consider compliance with the restrictions established for each partition defined by ξ i .
For each partition ξ i , the number of points on the elliptic subcurve, defined over the corresponding space of this partition, can be computed by computing the trace of Frobenius for the particular studied case. Let χ η be a subset of K s i , where η represents the corresponding subsets for partition s i . Thus, we have this value defined as n o p in the form n o p = # E ( χ η ) ξ = η + 1 κ , so for a space of size n, meaning | ξ | = n , it becomes n o p = i = 1 n η ξ + 1 κ ξ , where η ξ represents a prime integer for partition ξ and κ ξ represents the number of points from partition ξ .
Starting from the form described in [15], for the case of partitioning the parameter space with cryptographic properties for each partition, an endomorphism of the following form is defined:
ζ = E ( χ η ) E ( χ η ¯ ) ( ϕ , ι ) ( ϕ η , ι η ) O O
For each partition ξ i , with 1 i n , we have
κ ξ 2 η ξ
for each device involved in the double-authentication process.
There is the possibility to compute the number of points with cryptographic properties from the total set of points on these subspaces, according to the size of the partition and the chosen starting point in the process of computing a pair of primary credentials.

6.1. Graphic Representation

In this section, we provide graphic representations of the series of elliptic curves from which the ξ i subspaces are chosen and a representation of a point model with cryptographic properties resulting from the ESG algorithm.
In this regards, in Figure 2, a series of curves generated according to predefined K s i subspaces is represented and the choice of subspaces is made in compliance with the conditions from Theorem 1.
In Figure 3, three types of points are presented: green, representing those that passed the ESG algorithm test, from step 4, and that have cryptographic properties; gray, those that passed the test at the returned step according to the minimum standard ξ l 2 value imposed by the security policies; and red, those that did not pass the test at step 5. They represent a limited number from possible sets and are computed for an interval within the subspaces within d i ; P j defines their credentials within the algorithm.

6.2. ESG Algorithm. Cryptographic Parameter Computation

In this section, we describe our proposed method to compute the cryptographic parameters for each partition ξ i using an H D B S -type device.
Each of the devices involved in the communication process initially select optimal parameters that will be used in the double authentication.

6.3. Double-Authentication Method

In this section, the proposed algorithm for the cryptographic parameter computation necessary for double authentication and for agreement with the communication security credentials is presented.
Algorithm 1 is the method by which two devices authenticate each other in the case where at least one device is from P .
Algorithm 1: Subspace generation.
  • Initializations: E j p r e c is initialized at O .
  • 1. A partition ξ l is chosen for a value l generated pseudorandomly, and E j c u r r e n t is initialized at O .
  • 2. E j is built based on χ η coefficients.
  • 3. An approximation of the number of points with cryptographic properties is computed, according to Equation (8), and E j c u r r e n t is created accordingly.
  • 4. The degree of correlation between the parameters of the points on the elliptic curve is checked to verify the degree of resistance to cryptographic attacks, according to the methodology of [29,30]. In case this degree is greater than ϵ ξ l 1 , certified according to the security policies established for H D B S , m a x ( E j p r e c , E j c u r r e n t ) is retained in E j p r e c , and it returns to step 1. In other case, the current parameters are retained, in E j c u r r e n t
  • 5. The simulation of the cryptographic computation of the primary parameters is carried out according to Equation (6). If the ξ l 2 value is exceeded, the maximum accepted value for devices in < P > , then it returns to step 1. Otherwise, the current parameters are retained in E j c u r r e n t
  • 6. If the system returns a failure after testing the entire allocated partition, E j p r e c is returned together with a risk parameter allocated to this device. If the algorithm ends successfully, E j c u r r e n t is returned.
   All the communication processes that can be performed within an H D B S can be reduced to several communications, including this particular type, because any multiple communication required in multiple query processes within data mining operations can be divided into a certain number of such dual communication processes, with the application of the protocol described by the algorithm in the following part.
Let P j be a device from < P > , and let d i be another device from < S , C , M , P > . Let it be the case where the d i device initiates the connection (the same procedure is followed in the opposite case). Device d i is checked to determineif it is in Case 1 or Case 2 according to the description of the possible cases in Section 4. For Case 1, the protocols described in [15] are applied.
In Case 2, the procedure is as follows: device d j uses in the double-authentication process its own pair of keys:
( d p b 1 ξ d i , d p b 2 ξ d i ) , d p r ξ d i P p b 1 ξ P j , P p b 2 ξ P j
obtained from T S , and P j uses the key pair
( P p b 1 ξ P j , d p b 2 ξ P j ) , d p r ξ P j d p b 1 ξ d i , d p b 2 ξ d i
obtained from T S .
The initiator of the process generates a pair of pseudorandom values, which are used in the combination process according to its partition and will initiate the connection C h a l l e n g e . Upon such a request, the mobile device generates a pair of pseudorandom values that are combined according to the composition algorithm for mobile devices.
After this, the mobile device initiates the R e s p o n s e process, through which it transmits the primary credentials necessary in the intermediate process required in the authentication of P j by d i .
In order to perform a double authentication, a new round of communications is initiated from d i to P j , called C r e d e n t i a l   A u t h e n t i c a t i o n , through which the parameters computed in the previous rounds by each of the participants are used as primary input data.
On this basis, at the end of the three rounds of communication, the two devices involved in the protocol will have completed the double-authentication process, through which each proved to the other its identity within the T system. A representation of this process is briefly shown in Figure 4.

6.4. DWA Authentication Algorithm

In this section, in accordance with the steps presented in Section 6.3, we describe the proposed protocol, presented as the following Algorithm 2:
During the creation of the credentials used to secure the communication, d i participates in the process using the data created by itself, namely, C o m p ( Δ 1 , Δ 2 ) , and P j participates in the construction of the credentials to secure the communication with the data generated independently of d i , namely, C o m p ( μ 1 , μ 2 ) . On this basis, the final credentials are computed according to the combination of the data independently generated by each device involved in this process, which results in agreement with the credential protocol, not imposed credentials. Through this process of creating these credentials, there are also ensured authentications of P j by d i , as well as of d i by P j , which means that the man-in-the-middle attack is not possible.
Furthermore, the algorithm creates authenticated credentials for secure communication processes that take place between devices within a repeated query used to create a final answer given by a data mining action on H D B S . This procedure creates the credentials and takes into consideration a method of ensuring that cryptographic parameters are generated according to the parameters specific to each category of devices within T . In this whole set of procedures initiated by elements from T , it will be necessary for T S to manage the certificates of each device from T . Within the information stored about devices from < M and P > , it is necessary to have descriptive data about each device from each class of devices and at each connection; for a device that contains an empty T e m p o r a r y D B , it is first transferred to the database servers within H D B S , and only then will the query continue.
The security level of the algorithm presented is in accordance with the attack resistance of a model based on E C C , with the difference being that, for a possible attacker, the analysis must be conducted on < ξ > , which represents the composition of all the parts stored by the models from each device, and not on ξ i , a fact that increases the difficulty of processing the parameters and therefore increases the security level of the system in the case of a real attack on the protection model described for mobile devices within P .
Algorithm 2: DWA.
d i initiates the C h a l l e n g e process.
1.
( ϕ 1 , ϕ 2 ) ξ d i are generated, and C o m b i n e ( ϕ 1 , ϕ 2 ) is called. τ d i is returned.
2.
The parameter Δ 1 = τ d i d p b 1 ξ d i 1 + d p b 2 ξ d i ϕ 1 ϕ 2 is computed.
3.
Δ 2 is computed as the hash of the composition C o m p d p b 1 ξ d i , Δ 1 .
4.
Δ 3 is computed as the asymmetric encryption of the message Δ 2 using the secret key d p r ξ d i .
5.
The C o m p ( Δ 1 , Δ 2 ) values are communicated to P j (the C h a l l e n g e process).
Upon receiving the Δ 3 message, the P j device initiates the R e s p o n s e process; generates two pseudorandom values ( χ 1 , χ 2 ) ( ξ P ) j ; then calls the C o m b i n e ( P p b 1 ξ P j , Δ 1 ) function, which respects the entropy principles from ([31,32]); computes β 1 P j as the hash of the result given by the C o m p ( P p b 1 ξ P j , Δ 1 ) function; and computes β 2 P j to be the encryption of Δ 2 using d p b 1 ξ d i ’s public key. If the two computed parameters are not identical, the authentication of d i by P j ends in failure. Otherwise, the construction of the cryptographic parameters continues.
6.
P j computes μ 1 = τ P j P p b 1 ξ P j 1 + P p b 2 ξ P j χ 1 c h i 2 .
7.
P j computes μ 2 as the hash of C o m p ( P p b 1 ξ P j , μ 1 ) .
8.
μ 3 is computed as the asymmetric encryption of the message μ 2 using the secret key P p r ξ P j .
The R e s p o n s e process consists of P j sending C o m p ( μ 1 , μ 2 ) values. Upon receiving the message from P j , the device d i verifies the identity of d i in the same way as d i verified the identity of P j . If the verification fails, the protocol ends with a failure. Otherwise, the protocol initiates the process for the C r e d e n t i a l   A u t h e n t i c a t i o n phase.
9.
d i computes β 1 P j as the hash of the result returned by the C o m p ( P p b 1 ξ P j , μ 1 ) function.
10.
d i computes β 2 P j to be μ 2 ’s encryption using P p b 1 ξ P j ’s public key. If the two calculated parameters do not have the same value, the credential authentication step fails. If the two parameters have the same value, the process ends successfully by authenticating the credentials approved by the two parameters and proceeds to calculate the final credentials of secure communication: d i computes a parameter Δ 4 as the hash applied to the first three calculated parameters, encrypted with its public key, and transmits the result to P j .

6.5. Performance Analysis

In this section, the performance of the implemented model ( E S G ) is described in comparison with two models previously implemented by the beneficiary, namely, G N 1 (a variant based on solution presented in [15]) and K M K (a variant based on solution presented in [33]), which were solutions that contributed to the dual authentication system, with the common feature being the space over which elliptic curves are defined, for an environment which contains 3 server centers, 87 users from the C category, and 212 users from the class M , with heterogeneous systems.
The presented model was analyzed according to the computation time required to generate E j p r e c -type subspaces for the presented solution, and the time generation and communication time of the results for previous solutions (in Table 1).
Below are descriptions of the properties represented in the table, as well as some remarks on the results.
Generation time–the time (in seconds) required to compute the parameters for elliptic curves. The time to compute the parameters is correlated with power consumption.
Assignment time–the time (in seconds) required to transfer data to other devices that are involved in the communication. The assignment time is correlated with power consumption.
Recomputations–the number of parameter recalculations (at each 1000 calls) according to the security policies established by the beneficiary. It should be noted here that they change over time depending on the problems found during the periodic security audit. The recomputation time is correlated with power consumption.
Generation errors–the number of failures (at each 1000 calls) in the process of generating a subspace in a space.
Moreover, a performance analysis with the required computation time was performed every 6 months to establish the cryptographic credentials and the number of detected attacks on the system (the last analysis is presented in Table 2).
The data from this table are explained and interpreted below.
Cryptographic credential generation time–the time required to generate the cryptographic credentials used in double authentication and to secure the communication. The cryptographic credential generation time is correlated with power consumption.
Detected attacks–the number of detected attacks (at each 1000 calls).
As a general statement, the method of computing the cryptographic parameters, from the point of view of the allocated times/power consumption, depends on the initial generation method of the involved parameters and the security policy established by the beneficiary, which influences the number of recomputations and the generation time of the cryptographic parameters. This decision is made depending on the degree of security that is requested to be implemented.

6.6. Limitations of the Proposed Model

The proposed model ensures the creation of the necessary credentials in the cryptographic processes involved in securing communications and double authentication; otherwise, communications will be disallowed. This main limitation of the model is due to step 5 of Algorithm 1, where a ξ l 2 value is exceeded only if it meets the maximum conditions for this parameter, established as the maximum value accepted for the devices in < P > , according to the security policies, so the establishment of the security policies determines the number of repetitions of the process in certain cases. This practically translates into longer creation times for cryptographic credentials.
The second limitation involves the way in which double authentication is performed and the protection against man-in-the-middle attacks. This is present in all systems that respect this principle, namely, the creation of common cryptographic credentials is ensured, and in the case of an attack of the type mentioned above, communication is not allowed; the presence of such an attack can thus be signaled, but communication is not allowed.

7. Conclusions and Future Work

In this paper, we presented a method to determine the cryptographic parameters in the case of queries in an H D B S -type system; more precisely, we proposed a secure communication system for the case where smartphone-type devices are involved in this process and other heterogeneous devices are implied. The solution takes into account the particularities of these devices in terms of computing power and describes a way to generate cryptographic credentials for communications involving data-mining-type queries, as well as the transfer of base models defined as being of the T e m p o r a r y D B type. This system was implemented and is functional within an entity that uses these types of queries. During the implementation and after consultation with the users of the system, as future research, an estimation of the degree of risk for the subspaces that are used and the establishment of methods to determine optimal ϵ ξ l 1 and ϵ ξ l 2 parameters within security policies were requested. These represent the next steps in the research to be undertaken.

Author Contributions

N.C. investigated the ideas, formal analysis and review; O.-A.T. implemented the method and wrote the original draft of manuscript; D.I.H. provided the conceptualization, validation of the method, resources and funding support; O.-A.T. and D.I.H. revised the draft of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Lucian Blaga University of Sibiu through the research grant LBUS-IRG-2022-08.

Data Availability Statement

Not Applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RSA–CRivest, Shamir, and Adleman cryptography
ECCElliptic-curve cryptography
DMData mining
HDBSHeterogeneous database system
TSTrusted server

References

  1. Halevi, S.; Krawczyk, H. Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 1999, 2, 230–268. [Google Scholar] [CrossRef]
  2. Kumari, A.; Kapoor, V. Competing secure text encryption in intranet using elliptic curve cryptography. J. Discret. Math. Sci. Cryptogr. 2020, 23, 631–641. [Google Scholar] [CrossRef]
  3. Sudharson, K.; Arun, S. Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm. Intell. Autom. Soft Comput. 2022, 34, 1769–1784. [Google Scholar] [CrossRef]
  4. Mehibel, N.; Hamadouche, M.H. A new enhancement of elliptic curve digital signature algorithm. J. Discret. Math. Sci. Cryptogr. 2020, 23, 743–757. [Google Scholar] [CrossRef]
  5. Grigoriev, D.; Shpilrain, V. No-leak Authentication by the Sherlockk Holmes Method. Groups Complex. Cryptol. 2012, 4, 177–189. [Google Scholar] [CrossRef]
  6. Subramanian, E.K.; Tamilselvan, L. Elliptic curve Diffie-Hellman cryptosystem in big data cloud security. Clust.-Comput.- J. Netw. Softw. Tools Appl. 2020, 23, 3057–3067. [Google Scholar] [CrossRef]
  7. Alimoradi, R.; Arkian, H.R.; Razavian, S.M.J.; Ramzi, A. Seiied-Mohammad-Javad and Ramzi, Ali. Scalar multiplication in elliptic curve libraries. J. Discret. Math. Sci. Cryptogr. 2021, 24, 657–666. [Google Scholar] [CrossRef]
  8. Gun, S.; Murty, V.K. Lifting of Elliptic Curves. Pac. J. Math. 2019, 301, 101–106. [Google Scholar] [CrossRef]
  9. Nitaj, A.; Susilo, W.; Tonien, J. Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. In Proceedings of the 13th International Conference on Provable and Practical Security (ProvSec), Cairns, Australia, 1–4 October 2019. [Google Scholar]
  10. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography, 5th ed.; Chapman and Hall/CRC: London, UK, 2001. [Google Scholar]
  11. Martínez, V.G.; Encinas, L.H.; Muñoz, A.M.; Díaz, R.D. Secure elliptic curves and their performance. Log. J. Igpl 2019, 27, 227–238. [Google Scholar]
  12. Bennett, M.; Gherga, A.; Rechnitzer, A. Computing Elliptic Curves over Q. Math. Comput. 2019, 88, 1341–1390. [Google Scholar] [CrossRef]
  13. Faz-Hernandez, A.; Lopez, J.; Dahab, R. High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions. ACM Trans. Math. Softw. 2019, 45, 25–37. [Google Scholar] [CrossRef] [Green Version]
  14. Barański, M.; Gliwa, R.; Szmidt, J. Cryptographically Strong Elliptic Curves of Prime Order. Int. J. Electron. Telecommun. 2021, 67, 207–212. [Google Scholar]
  15. Stephanides, G.; Constantinescu, N. The GN-authenticated key agreement. Appl. Math. Comput. 2005, 170, 531–544. [Google Scholar] [CrossRef]
  16. Caruso, X.; Eid, E.; Lercier, R. Fast computation of elliptic curve isogenies in characteristic two. J. Lond. Math.-Soc.-Second. Ser. 2021, 104, 1901–1929. [Google Scholar] [CrossRef]
  17. Gualdoni, J.; Kurtz, A.; Myzyri, I.; Wheeler, M.; Rizvi, S. Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication. Procedia Comput. Sci. 2017, 114, 93–99. [Google Scholar] [CrossRef]
  18. Bellovin, S.M.; Merritt, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, 4–6 May 1992; pp. 72–84. [Google Scholar]
  19. Abdaoui, A.; Erbad, A.; Al-Ali, A.K.; Mohamed, A.; Guizani, M. Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet Things J. 2022, 9, 9987–9998. [Google Scholar] [CrossRef]
  20. Baashirah, R.; Abuzneid, A.; Mellouki, S.A.; Siraj, Z.; Zhan, C. Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm. Int. J. Interdiscip. Telecommun. Netw. 2021, 13, 1–11. [Google Scholar] [CrossRef]
  21. Saudy, N.F.; Ali, I.A.; Al Barkouky, R. Error analysis and detection procedures for elliptic curve cryptography. Ain Shams Eng. J. 2019, 10, 587–597. [Google Scholar] [CrossRef]
  22. Aka, M.; Luethi, M.; Michel, P.; Wieser, A. Simultaneous supersingular reductions of CM elliptic curves. J. Fur Die Reine Und Angew. Math. 2022, 786, 1–43. [Google Scholar] [CrossRef]
  23. Ciet, M. Aspects of Fast and Secure Arithmetics for Elliptic Curve Cryptography. Ph.D. Thesis, Universite Catholique de Louvain, Louvain-la-Neuve, Belgium, 2003. [Google Scholar]
  24. Constantinescu, N. Non Singular Elliptic Curves—From Theory to Application. Algorithm Attacks Discussions. Mathematica 2008, 50, 177–186. [Google Scholar]
  25. Gupta, V.; Acu, A.M.; Srivastava, H.M. Difference of Some Positive Linear Approximation Operators for Higher-Order Derivatives. Symmetry 2020, 12, 915. [Google Scholar] [CrossRef]
  26. Wu, T.; Wang, R. Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs. J. Cryptogr. Eng. 2019, 9, 401–410. [Google Scholar] [CrossRef]
  27. Smart, N.P. The Discrete Logarithm Problem on Elliptic Curves of Trace One. J. Cryptol. 1999, 12, 193–196. [Google Scholar] [CrossRef]
  28. Aljamaly, K.T.R.; Ajeena, R.K.K. The elliptic scalar multiplication graph and its application in elliptic curve cryptography. J. Discret. Math. Sci. Cryptogr. 2021, 24, 1793–1807. [Google Scholar] [CrossRef]
  29. Coron, J.S.; Lefranc, D.; Poupard, G. A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. In Cryptographic Hardware and Embedded Systems—CHES 2005; Proceedings of 7th International Workshop, Edinburgh, UK, 29 August–1 September 2005; Rao, J.R., Sunar, B., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3659. [Google Scholar]
  30. Hashimoto, Y.; Takashima, K. Improved supersingularity testing of elliptic curves. Jsiam Lett. 2021, 13, 29–32. [Google Scholar] [CrossRef]
  31. Acu, A.M.; Maduta, A.; Otrocol, D.; Rasa, I. Inequalities for Information Potentials and Entropies. Mathematics 2020, 8, 2056. [Google Scholar] [CrossRef]
  32. Acu, A.M.; Hodis, S.; Rasa, I. Estimates for the Differences of Certain Positive Linear Operators. Mathematics 2020, 8, 798. [Google Scholar] [CrossRef]
  33. Kumari, A.; Abbasi, M.Y.; Kumar, V.; Khan, A.A. A secure user authentication protocol using elliptic curve cryptography. J. Discret. Math. Sci. Cryptogr. 2019, 22, 521–530. [Google Scholar] [CrossRef]
Figure 1. System description.
Figure 1. System description.
Mathematics 11 00122 g001
Figure 2. Series of elliptic curves.
Figure 2. Series of elliptic curves.
Mathematics 11 00122 g002
Figure 3. Cryptographic point detection.
Figure 3. Cryptographic point detection.
Mathematics 11 00122 g003
Figure 4. System description.
Figure 4. System description.
Mathematics 11 00122 g004
Table 1. Parameter generation.
Table 1. Parameter generation.
GN1KMKESG
Generation time1.172.111.8
Assignment time4.154.150.3
Recomputations27041
Generation errors129128215
Table 2. Credential generation.
Table 2. Credential generation.
GN1KMKESG
Cryptographic credential generation time0.721.120.3
Detected attacks61925
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hunyadi, D.I.; Ticleanu, O.-A.; Constantinescu, N. Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining. Mathematics 2023, 11, 122. https://doi.org/10.3390/math11010122

AMA Style

Hunyadi DI, Ticleanu O-A, Constantinescu N. Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining. Mathematics. 2023; 11(1):122. https://doi.org/10.3390/math11010122

Chicago/Turabian Style

Hunyadi, Daniel Ioan, Oana-Adriana Ticleanu, and Nicolae Constantinescu. 2023. "Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining" Mathematics 11, no. 1: 122. https://doi.org/10.3390/math11010122

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop