[Ace] quiz question on energy cost of public key computations (was: Re: Symmetric Keys Don't Scale ... was Aw: Re: New Version of Proposed Charter)

Rene Struik <rstruik.ext@gmail.com> Fri, 07 February 2014 16:08 UTC

Return-Path: <rstruik.ext@gmail.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AEBD1A03CC for <ace@ietfa.amsl.com>; Fri, 7 Feb 2014 08:08:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f0AodrhA7__n for <ace@ietfa.amsl.com>; Fri, 7 Feb 2014 08:08:20 -0800 (PST)
Received: from mail-ig0-x232.google.com (mail-ig0-x232.google.com [IPv6:2607:f8b0:4001:c05::232]) by ietfa.amsl.com (Postfix) with ESMTP id B58691A01AF for <ace@ietf.org>; Fri, 7 Feb 2014 08:08:20 -0800 (PST)
Received: by mail-ig0-f178.google.com with SMTP id uq10so2131223igb.5 for <ace@ietf.org>; Fri, 07 Feb 2014 08:08:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=lHCqPhHfGRuAZ/QrQfe+YvAnrtpri1zmOSSZpJQTTDk=; b=LMB8/5XOa90gjguTg0HSn/My545je1rOE9WVp50J47TFCp7q0tQrn7cFdxW9P/Y+Xs iDE/WQcO597090Its+yGyvUGY1vnXXdUOTgzaK0QBHkL0F9xZ/X1V9QyGpfJNxAfJVyC o5sfPVnUgjeK9kwv5ySRaeXZ+z6sff8lHdvDIuCett5jSvjjgjPEEwwj2grnvO0+RmnC 7gZwksfayAShSMV62hoTEQ9jtt8yYJr7is4+K+F4S5lElbFgGvUd7KfydpMpdjHS42Wo uLPKpoUQxTnjaxY1Wq0L37bv5iL63EsizKIjeRyRnhovh1wgt8N4YqocBlIHMoKIY6Wi cN/Q==
X-Received: by 10.42.47.201 with SMTP id p9mr7953277icf.4.1391789300525; Fri, 07 Feb 2014 08:08:20 -0800 (PST)
Received: from [192.168.1.101] (CPE0013100e2c51-CM001cea35caa6.cpe.net.cable.rogers.com. [99.231.3.110]) by mx.google.com with ESMTPSA id y9sm10984568igl.0.2014.02.07.08.08.18 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 07 Feb 2014 08:08:19 -0800 (PST)
Message-ID: <52F504EB.5000208@gmail.com>
Date: Fri, 07 Feb 2014 11:08:11 -0500
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: Olaf Bergmann <bergmann@tzi.org>, Paul Lambert <paul@nymbus.net>
References: <CF040CAB.6550%goran.selander@ericsson.com> <52E68012.4050502@tzi.de> <46A1DF3F04371240B504290A071B4DB63E3E8E29@SZXEMA510-MBX.china.huawei.com> <87zjmga5t9.fsf@tzi.org> <CF0D23E4.6FD1%goran.selander@ericsson.com> <46A1DF3F04371240B504290A071B4DB63E3EA46E@SZXEMA510-MBX.china.huawei.com> <52E8D8CE.70202@tzi.de> <EC73E297-89E8-460B-ACF2-5A46EE62DA1D@nymbus.net> <871tzq7o7s.fsf@tzi.org> <D57D6F4F-FD05-4B30-A638-9B9F3F002E40@nymbus.net> <87zjm8z8ae.fsf@tzi.org> <trinity-52b2af0f-d701-4f86-bcad-e674fe4d74b4-1391601421855@3capp-gmx-bs10> <449B1D64-C76F-49AC-A45A-C99340193950@nymbus.net> <87txcbt9tz.fsf@tzi.org>
In-Reply-To: <87txcbt9tz.fsf@tzi.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Stefanie Gerdes <gerdes@tzi.de>, Bert Greevenbosch <Bert.Greevenbosch@huawei.com>, Hannes Tschofenig <Hannes.Tschofenig@gmx.net>, Göran Selander <goran.selander@ericsson.com>, "ace@ietf.org" <ace@ietf.org>
Subject: [Ace] quiz question on energy cost of public key computations (was: Re: Symmetric Keys Don't Scale ... was Aw: Re: New Version of Proposed Charter)
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Feb 2014 16:08:23 -0000

Dear Olaf:

I have a quiz question for you all:

What is the estimated *total* energy cost of carrying out 30 billion elliptic curve scalar multiplications on RFID-style devices using a best-of-breed hardware only implementation. For simplicity, let us consider 163-bit binary curves. We will ignore any other aspects.

Answer options:
a) 1 kWh; {10c}
b) 1 thousand kWh;
c) 1 million kWh;
d) 1 billion kWh.

There are no prizes. However, I hope this puts the contribution that best-of-breed crypto computations make to global warming (vs. the contribution hereto of email traffic regarding the ACE charter and activities) into perspective.

Note: This question was triggered by Cisco's and Intel's forecast that by 2020 there would be 30 billion interconnected objects swarming the planet.

Best regards, Rene

[excerpt of your email as of February 7, 2014]
I do not see why there is any difference between symmetric and asymmetric keys (except for the additional contribution to global warming of the latter
option.)


On 2/7/2014 6:56 AM, Olaf Bergmann wrote:
> Paul,
>
> Paul Lambert <paul@nymbus.net> writes:
>
>> Identity should be based on the demonstrated ownership of a public keys.
> I think this is an important point in your arguing for public keys. You
> want them as identifier used in authentication.
>
> First of all, as was discussed before, we should take into consideration
> that the devices' identities are given by a set of attributes. This may
> be a set of just one element, including the public key as its value, in
> some scenarios but this is not always the case. For example, a second
> element in this list may be the device group identifier.
>
> And, given that a device has some initial keying material (this is a
> precondition for ace but how this happens is out of scope), I do not see
> why there is any difference between symmetric and asymmetric keys
> (except for the additional contribution to global warming of the latter
> option.) -- I completely understand the business model for chip
> manufacturers and equipment vendors behind using asymmetric keys. And I
> understand why these are useful when certificates and PKIX are used. But
> in a distributed environment without a central authentication and
> authorization server, what is their benefit?
>
> Gruesse
> Olaf
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace


-- 
email: rstruik.ext@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363