Post-quantum cryptosystems for Internet-of-Things : a survey on lattice-based algorithms

Asif, Rameez (2021) Post-quantum cryptosystems for Internet-of-Things : a survey on lattice-based algorithms. IoT, 2 (1). pp. 71-91. ISSN 2624-831X (https://doi.org/10.3390/iot2010005)

[thumbnail of Asif-IoT-2021-Post-quantum-cryptosystems-for-Internet-of-Things]
Preview
Text. Filename: Asif_IoT_2021_Post_quantum_cryptosystems_for_Internet_of_Things.pdf
Final Published Version
License: Creative Commons Attribution 4.0 logo

Download (968kB)| Preview

Abstract

The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost instantaneously compared to the billions of years of computation needed by traditional computing machines. Researchers advocate the development of novel strategies to include data encryption in the post-quantum era. Lattices have been widely used in cryptography, somewhat peculiarly, and these algorithms have been used in both; (a) cryptoanalysis by using lattice approximation to break cryptosystems; and (b) cryptography by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions. Most of the dominant features of lattice-based cryptography (LBC), which holds it ahead in the post-quantum league, include resistance to quantum attack vectors, high concurrent performance, parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. While these methods offer possible security for classical cryptosytems in theory and experimentation, their implementation in energy-restricted Internet-of-Things (IoT) devices requires careful study of regular lattice-based implantation and its simplification in lightweight lattice-based cryptography (LW-LBC). This streamlined post-quantum algorithm is ideal for levelled IoT device security. The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.