**6. References**


[8] Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. *IEEE Communications Surveys and Tutorials*, 8(2):2–23, 2006.

14 Will-be-set-by-IN-TECH

signing) can be as fast as a typical block cipher and is several orders of magnitude faster than

**Algorithm** 1024-bit RSA 160-bit MQQ 128-bit AES Throughput 40Kbps 44.27Gbps / 399.04Mbps 7.78Gbps

It is natural that the spread of ubiquitous computing to increase the number of devices with low computing power scattered all over the planet. The security of data transmissions from these devices should be improved in a preventative manner to avoid possible attacks. Regarding WSNs, RSA public key algorithm is the most commonly used is standardized, and achieves efficiency relatively good. The algorithm based on elliptic curves have been extensively studied in academia as an alternative to RSA, and the results show that it is possible to achieve good results with smaller keys. The algorithm MQQ was discovered recently and showed significant results when compared to RSA and ECC, taking as parameters authenticity and digital signature. This algorithm is post-quantum, and may even be a good solution when the quantum computation is standardized. Despite the satisfactory results of MQQ front of RSA and ECC algorithms, there is not a work about performance

[1] D. Gligoroski, S. Markovski, and S.J. Knapskog. A public key block cipher based on

[2] M. El-Hadedy, D. Gligoroski, and S.J. Knapskog. High performance implementation of a public key block cipher-mqq, for fpga platforms. In *Reconfigurable Computing and FPGAs,*

[3] Marcos Simplicio Margi, MS Jr, and Tereza C. M. B. Carvalho Barreto. Segurança em Redes de Sensores Sem Fio. In *Simpósio Brasileiro em Segurança da Informação*, pages

[4] A.A.F. Loureiro, J.M.S. Nogueira, L.B. Ruiz, R.A. de Freitas Mini, E.F. Nakamura, and C.M.S. Figueiredo. Redes de sensores sem fio. In *Simpósio Brasileiro de Redes de*

[5] Xuan Hung Le, Ravi Sankar, Murad Khalid, and Sungyoung Lee. Public Key Cryptography - based Security Scheme for Wireless Sensor Networks in Healthcare. In *4th International Conference on Ubiquitous Information Management and Communication*,

[6] MEMSIC. Mote Processor Radio Mote Interface Boards User Manual - Document Part

[7] E. Shi and A. Perrig. Designing secure sensor networks. *Wireless Communication*

multivariate quadratic quasigroups. *Arxiv preprint arXiv:0808.0247*, 2008.

*2008. ReConFig'08. International Conference on*, pages 427–432. IEEE, 2008.

**Table 4.** Synthesis Results for 160bit MQQ realized in Virtex-5 chip xc5vfx70t-2-˝o1136 [2]

most popular public key algorithms like RSA, DH or ECC.

evaluation specific to encryption and decryption of data.

*Computadores (SBRC)*, pages 179–226, 2003.

Number: 7430-0021-09 Rev A, 2012

*Magazine*, 11(6):38–43, 2004.

Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno

**5. Conclusion and future work**

**Author details**

**6. References**

149–194, 2009.

pages 1–7, 2010.

*Universidade Federal de Sergipe, Brasil*

	- [29] N. Koblitz. Elliptic curve cryptosystems. *Mathematics of computation*, 48(177):203–209, 1987.
	- [30] V. Miller. Use of elliptic curves in cryptography. In *Advances in Cryptology CRYPTO Proceedings*, pages 417–426. Springer, 1986.
	- [31] Kakali Chatterjee, Asok De, and Daya Gupta. Software Implementation of Curve based Cryptography for Constrained Devices. *International Journal of Computer Applications*, 24(5):18–23, 2011.
	- [32] N. Koblitz. A family of jacobians suitable for discrete log cryptosystems. In *Advances in Cryptology - Crypto88*, pages 94–99. Springer, 1990.
	- [33] L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede. Flexible hardware architectures for curve-based cryptography. In *Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006 IEEE International Symposium on*, pages 4–pp. IEEE, 2008.
	- [34] R.J.M. Maia. Análise da viabilidade da implementação de algoritmos pós-quânticos baseados em quase-grupos multivariados quadráticos em plataformas de processamento limitadas. Master's thesis, USP, 2010.
	- [35] R. Ahlawat, K. Gupta, and S.K. Pal. From mq to mqq cryptography: Weaknesses new solutions. In *Western European Workshop on Research in Cryptology*, 2009.
	- [36] Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, and Çetin K. Koç. Elliptic and hyperelliptic curves on embedded *μ*P. *ACM Transactions on Embedded Computing Systems*, 3(3):509–533, August 2004.
	- [37] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In *In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CUES 2004), Boston Marriott Cambridge Cambridge (Boston)August*, 2004.
	- [38] Shish Ahmad, Mohd. Rizwan beg, and Qamar Abbas. Energy Saving Secure Framework for Sensor Network using Elliptic Curve Cryptography. *IJCA Special Issue on ?Mobile Ad-hoc Networks?*, pages 167–172, 2010.
	- [39] Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede. Public-Key Cryptography on the Top of a Needle. In *2007 IEEE International Symposium on Circuits and Systems*, pages 1831–1834. Ieee, May 2007.
	- [40] T. Wollinger. *Software and hardware implementation of hyperelliptic curve cryptosystems*. Europ. Univ.-Verl., 2004.
	- [41] S. Prasanna Ganesan. An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography. *International J. of Recent Trends in Engineering and Technology*, 3(2):2–4, 2010.
	- [42] D. Gligoroski, S.J. Knapskog, S. Markovski, R.S. Ødegård, R.E. Jensen, L. Perret, and J.C. Faugère. The digital signature scheme mqq-sig. *Arxiv preprint arXiv:1010.3163*, 2010.
