2018
DOI: 10.3390/cryptography2010005
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

Abstract: Abstract:The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Comparably, the Raspberry Pi 4 has similar specifications and therefore more closely represents the IoT devices of today. Previous studies have either used non-constrained devices [40,42] due to the availability of technology or devices of very limited capability compared to current IoT device standards [58][59][60]. Furthermore, some finalist PQAs, such as BIKE and Classic McEliece, have been modified for performance optimization between the second and third rounds of the NIST competition, and it is therefore prudent to test the most recent iterations of these PQAs [24,25].…”
Section: Discussionmentioning
confidence: 99%
“…Comparably, the Raspberry Pi 4 has similar specifications and therefore more closely represents the IoT devices of today. Previous studies have either used non-constrained devices [40,42] due to the availability of technology or devices of very limited capability compared to current IoT device standards [58][59][60]. Furthermore, some finalist PQAs, such as BIKE and Classic McEliece, have been modified for performance optimization between the second and third rounds of the NIST competition, and it is therefore prudent to test the most recent iterations of these PQAs [24,25].…”
Section: Discussionmentioning
confidence: 99%
“…QC offers unconditional security, as eavesdropping attempts are detectable, making it a valuable asset in safeguarding data transmission (Ngobeni et al, 2020;Djordjevic, 2022). However, as quantum-assisted crypto analysers pose a new threat, the security community must focus on devising post-quantum techniques and standardized security protocols (Suomalainen et al, 2018). While the literature covers various aspects of quantum-based technologies, it underscores the lack of quantum-based signalling models for interconnect and roaming networks over IPX, emphasizing the significance of developing a comprehensive quantum-based signalling model for NB-IoT traffic over IRN.…”
Section: Related Workmentioning
confidence: 99%
“…The emergence of new edge computing platforms, such as cloud computing, softwaredefined networks, and the Internet-of-Things (IoT), calls for the adoption of an increasing number of security frameworks, which in turn require the introduction of a variety of primitive cryptographic elements, but the security is just one vector in the IoT world [127]. It is also necessary to implement those secure frameworks that consume less on-board processing, memory and power resources [128].…”
Section: Lightweight Lattice-based Cryptography For Iot Devicesmentioning
confidence: 99%