2022
DOI: 10.3390/s22052057
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems

Abstract: Concern for the security of embedded systems that implement IoT devices has become a crucial issue, as these devices today support an increasing number of applications and services that store and exchange information whose integrity, privacy, and authenticity must be adequately guaranteed. Modern lattice-based cryptographic schemes have proven to be a good alternative, both to face the security threats that arise as a consequence of the development of quantum computing and to allow efficient implementations of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 63 publications
0
11
0
Order By: Relevance
“…An eavesdropper can target the principal system, and genuine SUs can operate as friendly jamming to prevent data spillage 89 . In Reference 90, SU aided anti‐eavesdropping communication for primary system defense. The PUs were the game leaders, and the SUs were the followers in a Stackelberg game‐based cooperative jamming strategy.…”
Section: Literature Surveymentioning
confidence: 99%
“…An eavesdropper can target the principal system, and genuine SUs can operate as friendly jamming to prevent data spillage 89 . In Reference 90, SU aided anti‐eavesdropping communication for primary system defense. The PUs were the game leaders, and the SUs were the followers in a Stackelberg game‐based cooperative jamming strategy.…”
Section: Literature Surveymentioning
confidence: 99%
“…To overcome this shortcoming, Karatsuba's algorithm is used only for those polynomials whose degree is greater than 32. To ensure sufficient cryptographic strength of the algorithm, it is necessary to correctly choose the parameters N, q, and p. Table 1 presents parameters that are safe according to [24]. At the same time, parameter sets 1-4 provide the smallest key size for the required cryptographic strength, parameters 5-8 provide the best performance with a larger key size, and parameter sets 9-12 are selected so as to minimize the value of C for the required cryptographic strength level, which is calculated by the formula:…”
Section: Developing the Modified Ntruencrypt Algorithmmentioning
confidence: 99%
“…Although different works such as [13] or [14] follow a fullparallel design, the hardware implementation of this work has followed a serial architecture, applying the same strategy that is used in [15]. Fig.…”
Section: B Hardware Implementationmentioning
confidence: 99%
“…Previously published works [13], [14] and [15] introduced an Arithmetic Unit (AU), that instead of perform a multiplication between coefficients, uses the reduced number of elements presented in r(x) to perform an addition (for r j = 1) or a subtraction (for r j = −1). This work undergoes some changes to this AU, which instead of using a multiplexer, it now utilizes a logic-gate AND as illustrated in Fig.…”
Section: B Hardware Implementationmentioning
confidence: 99%