Implementing the Transport Layer Security Protocol for Embedded Systems

Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet tr...

Full description

Bibliographic Details
Main Author: Werstén, Bengt
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för systemteknik 2007
Subjects:
TLS
SSL
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767
id ndltd-UPSALLA1-oai-DiVA.org-liu-8767
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-liu-87672018-01-14T05:13:58ZImplementing the Transport Layer Security Protocol for Embedded SystemsengImplementation och anpassning av Transport Layer Security för inbyggda systemWerstén, BengtLinköpings universitet, Institutionen för systemteknikInstitutionen för systemteknik2007TLSSSLembedded systemscryptographyhardware supportexport lawsComputer and Information SciencesData- och informationsvetenskapWeb servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. This thesis aims to investigate if TLS can be adapted to embedded systems without sacrificing much of the system resources available. A literature study and an implementation of TLS have been performed. The literature study determined resource intense parts of TLS, hardware support as well as export laws applicable to TLS. The different parts of the implementation are evaluated on an ARM7-core to determine the execution times. The results for the symmetric ciphers AES and 3DES are compared when measuring execution times using both software and hardware solutions. The size of the implementation is also measured. TLS was shown to be able to integrate on embedded systems. Practical issues such as certificates and keys can be solved in different ways to suite the target environment. The largest remaining issue is the execution time for asymmetric algorithms. The results that are provided clearly illustrates that the RSA used for key exchange is very time consuming. Alternative solutions to gain better performance are discussed. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic TLS
SSL
embedded systems
cryptography
hardware support
export laws
Computer and Information Sciences
Data- och informationsvetenskap
spellingShingle TLS
SSL
embedded systems
cryptography
hardware support
export laws
Computer and Information Sciences
Data- och informationsvetenskap
Werstén, Bengt
Implementing the Transport Layer Security Protocol for Embedded Systems
description Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. This thesis aims to investigate if TLS can be adapted to embedded systems without sacrificing much of the system resources available. A literature study and an implementation of TLS have been performed. The literature study determined resource intense parts of TLS, hardware support as well as export laws applicable to TLS. The different parts of the implementation are evaluated on an ARM7-core to determine the execution times. The results for the symmetric ciphers AES and 3DES are compared when measuring execution times using both software and hardware solutions. The size of the implementation is also measured. TLS was shown to be able to integrate on embedded systems. Practical issues such as certificates and keys can be solved in different ways to suite the target environment. The largest remaining issue is the execution time for asymmetric algorithms. The results that are provided clearly illustrates that the RSA used for key exchange is very time consuming. Alternative solutions to gain better performance are discussed.
author Werstén, Bengt
author_facet Werstén, Bengt
author_sort Werstén, Bengt
title Implementing the Transport Layer Security Protocol for Embedded Systems
title_short Implementing the Transport Layer Security Protocol for Embedded Systems
title_full Implementing the Transport Layer Security Protocol for Embedded Systems
title_fullStr Implementing the Transport Layer Security Protocol for Embedded Systems
title_full_unstemmed Implementing the Transport Layer Security Protocol for Embedded Systems
title_sort implementing the transport layer security protocol for embedded systems
publisher Linköpings universitet, Institutionen för systemteknik
publishDate 2007
url http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767
work_keys_str_mv AT werstenbengt implementingthetransportlayersecurityprotocolforembeddedsystems
AT werstenbengt implementationochanpassningavtransportlayersecurityforinbyggdasystem
_version_ 1718610793258287104