Post-Quantum Cryptography for Embedded Systems

被引:0
|
作者
Koziel, Brian [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Univ Jean Monnet, CNRS, Lab Hubert Curien, F-42000 St Etienne, France
[2] CINVESTAV, Unidad Guadalajara, Zapopan 45019, Mexico
[3] CINVESTAV, Unidad Tamaulipas, Ciudad Victoria 87130, Tamaulipas, Mexico
关键词
SECURITY;
D O I
10.1109/ENC56672.2022.9882904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the years, important breakthroughs have been made in protecting data at rest or in-transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has pose new challenges for protecting data in systems and devices tightly close to humans. Embedded systems with constrained computing capabilities are a central part in IoT and CPS, susceptible to different security attacks and vulnerabilities. Lightweight cryptography is the term used for grouping the different cryptographic algorithms and techniques tailored to observe the requirements for data security in such constrained applications. Nowadays, the potential emergence of quantum computing threatens these security solutions widely in use. Thus, novel cryptographic algorithms deemed to resist quantum attack models are being standardized by the National Institute of Standards and Technology (NIST) in the Post-Quantum Cryptography (PQC) Standardization process. In this paper, we present a study on how the advent of quantum computing might have a deep impact on the security of constrained applications in the IoT and CPS domains. We focused on the NIST PQC finalists, from the perspective of their use for securing embedded systems.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [22] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [23] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [24] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [25] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [26] A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
    Kempf, Marcel
    Gauder, Nikolas
    Jaeger, Benedikt
    Zirngibl, Johannes
    Carle, Georg
    2024 23RD IFIP NETWORKING CONFERENCE, IFIP NETWORKING 2024, 2024, : 186 - 194
  • [27] Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography
    Ravi, Prasanna
    Sundar, Vijaya Kumar
    Chattopadhyay, Anupam
    Bhasin, Shivam
    Easwaran, Arvind
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [28] A Survey of Post-Quantum Cryptography Migration in Vehicles
    Lohmiller, Nils
    Kaniewski, Sabrina
    Menth, Michael
    Heer, Tobias
    IEEE ACCESS, 2025, 13 : 10160 - 10176
  • [29] Resource guide for teaching post-quantum cryptography
    Holden, Joshua
    CRYPTOLOGIA, 2023, 47 (05) : 459 - 465
  • [30] Evaluation of Post-Quantum Distributed Ledger Cryptography
    Campbell, Robert E., Sr.
    JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2019, 2 (01): : 17 - 24