Post-quantum cryptosystems for Internet-of-Things : a survey on lattice-based algorithms
Asif, Rameez (2021) Post-quantum cryptosystems for Internet-of-Things : a survey on lattice-based algorithms. IoT, 2 (1). pp. 71-91. ISSN 2624-831X (https://doi.org/10.3390/iot2010005)
Preview |
Text.
Filename: Asif_IoT_2021_Post_quantum_cryptosystems_for_Internet_of_Things.pdf
Final Published Version License: Download (968kB)| Preview |
Abstract
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost instantaneously compared to the billions of years of computation needed by traditional computing machines. Researchers advocate the development of novel strategies to include data encryption in the post-quantum era. Lattices have been widely used in cryptography, somewhat peculiarly, and these algorithms have been used in both; (a) cryptoanalysis by using lattice approximation to break cryptosystems; and (b) cryptography by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions. Most of the dominant features of lattice-based cryptography (LBC), which holds it ahead in the post-quantum league, include resistance to quantum attack vectors, high concurrent performance, parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. While these methods offer possible security for classical cryptosytems in theory and experimentation, their implementation in energy-restricted Internet-of-Things (IoT) devices requires careful study of regular lattice-based implantation and its simplification in lightweight lattice-based cryptography (LW-LBC). This streamlined post-quantum algorithm is ideal for levelled IoT device security. The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.
-
-
Item type: Article ID code: 75338 Dates: DateEvent5 February 2021Published29 January 2021AcceptedSubjects: Technology > Electrical engineering. Electronics Nuclear engineering
Science > Mathematics > Electronic computers. Computer scienceDepartment: Faculty of Engineering > Electronic and Electrical Engineering Depositing user: Pure Administrator Date deposited: 09 Feb 2021 09:09 Last modified: 11 Nov 2024 12:59 URI: https://strathprints.strath.ac.uk/id/eprint/75338