2022
DOI: 10.3390/s22072484
|View full text |Cite
|
Sign up to set email alerts
|

Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?

Abstract: Recent progress in quantum computers severely endangers the security of widely used public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is currently exploring new post-quantum cryptographic algorithms that are robust against quantum computers. Security is seen as one of the most critical issues of low-power IoT devices—even with pre-quantum public-key cryptography—since IoT devices have tight energy constraints, limited computational power and strict memory limitations. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…It is therefore necessary to explore new post-quantum cryptographic algorithms and investigate architectures against strong attackers, especially those employing quantum computing [ 213 ]. Recent research works have investigated the application of potential post-quantum key encapsulation mechanisms and the digital signature algorithms identified in current NIST proposals [ 214 ]. There is always a risk of sensitive information being leaked as the function result in FE processing is communicated to the presumably sincere but inquisitive coordinator [ 121 ].…”
Section: Open Challenges and Research Trendsmentioning
confidence: 99%
“…It is therefore necessary to explore new post-quantum cryptographic algorithms and investigate architectures against strong attackers, especially those employing quantum computing [ 213 ]. Recent research works have investigated the application of potential post-quantum key encapsulation mechanisms and the digital signature algorithms identified in current NIST proposals [ 214 ]. There is always a risk of sensitive information being leaked as the function result in FE processing is communicated to the presumably sincere but inquisitive coordinator [ 121 ].…”
Section: Open Challenges and Research Trendsmentioning
confidence: 99%
“…Companies use IoT devices and networks to exchange top secret and condential information, [4]. Some of this information is sent unencrypted or encrypted by algorithms that are vulnerable to attacks [4].Cryptographic algorithms are primarily used to ensure security and privacy [4]. One of the cryptographic algorithms used on IoT devices is Camellia.…”
mentioning
confidence: 99%
“…According to the ndings of this study, these S-Boxes are vulnerable to various attacks. Cryptographic algorithms are unavoidable, but they must be designed in advance to withstand attacks [4].The existing studies show that intruders attack the Camellia algorithm with various attack methods. For instance:i.…”
mentioning
confidence: 99%
See 2 more Smart Citations