Post-Quantum Cryptography for Embedded Systems

被引:0
|
作者
Koziel, Brian [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Univ Jean Monnet, CNRS, Lab Hubert Curien, F-42000 St Etienne, France
[2] CINVESTAV, Unidad Guadalajara, Zapopan 45019, Mexico
[3] CINVESTAV, Unidad Tamaulipas, Ciudad Victoria 87130, Tamaulipas, Mexico
关键词
SECURITY;
D O I
10.1109/ENC56672.2022.9882904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the years, important breakthroughs have been made in protecting data at rest or in-transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has pose new challenges for protecting data in systems and devices tightly close to humans. Embedded systems with constrained computing capabilities are a central part in IoT and CPS, susceptible to different security attacks and vulnerabilities. Lightweight cryptography is the term used for grouping the different cryptographic algorithms and techniques tailored to observe the requirements for data security in such constrained applications. Nowadays, the potential emergence of quantum computing threatens these security solutions widely in use. Thus, novel cryptographic algorithms deemed to resist quantum attack models are being standardized by the National Institute of Standards and Technology (NIST) in the Post-Quantum Cryptography (PQC) Standardization process. In this paper, we present a study on how the advent of quantum computing might have a deep impact on the security of constrained applications in the IoT and CPS domains. We focused on the NIST PQC finalists, from the perspective of their use for securing embedded systems.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [2] Special Issue on Post-Quantum Cryptography for Embedded Systems
    Bhasin, Shivam
    De Santis, Fabrizio
    Regazzoni, Francesco
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [3] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    Microprocessors and Microsystems, 2021, 87
  • [4] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [5] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [6] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [7] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [8] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [9] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [10] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265