Post-Quantum Cryptography for Embedded Systems

被引:0
|
作者
Koziel, Brian [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Univ Jean Monnet, CNRS, Lab Hubert Curien, F-42000 St Etienne, France
[2] CINVESTAV, Unidad Guadalajara, Zapopan 45019, Mexico
[3] CINVESTAV, Unidad Tamaulipas, Ciudad Victoria 87130, Tamaulipas, Mexico
关键词
SECURITY;
D O I
10.1109/ENC56672.2022.9882904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the years, important breakthroughs have been made in protecting data at rest or in-transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has pose new challenges for protecting data in systems and devices tightly close to humans. Embedded systems with constrained computing capabilities are a central part in IoT and CPS, susceptible to different security attacks and vulnerabilities. Lightweight cryptography is the term used for grouping the different cryptographic algorithms and techniques tailored to observe the requirements for data security in such constrained applications. Nowadays, the potential emergence of quantum computing threatens these security solutions widely in use. Thus, novel cryptographic algorithms deemed to resist quantum attack models are being standardized by the National Institute of Standards and Technology (NIST) in the Post-Quantum Cryptography (PQC) Standardization process. In this paper, we present a study on how the advent of quantum computing might have a deep impact on the security of constrained applications in the IoT and CPS domains. We focused on the NIST PQC finalists, from the perspective of their use for securing embedded systems.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Designing and Delivering a Post-Quantum Cryptography Course
    Borrelli, Thomas J.
    Polak, Monika
    Radziszowski, Stanislaw
    PROCEEDINGS OF THE 55TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE 2024, VOL. 1, 2024, : 137 - 143
  • [32] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [33] TPM-Based Post-Quantum Cryptography
    Paul, Sebastian
    Schick, Felix
    Seedorf, Jan
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [34] Faster Isogenies for Post-quantum Cryptography: SIKE
    Elkhatib, Rami
    Koziel, Brian
    Azarderakhsh, Reza
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 49 - 72
  • [35] US outlines shift to post-quantum cryptography'
    Banks, Michael
    PHYSICS WORLD, 2022, 35 (06)
  • [36] A Performance Evaluation of IPsec with Post-Quantum Cryptography
    Bae, Seungyeon
    Chang, Yousung
    Park, Hyeongjin
    Kim, Minseo
    Shin, Youngjoo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 249 - 266
  • [37] Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem
    Wang, Wen
    Szefer, Jakub
    Niederhagen, Ruben
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 371 - 371
  • [38] On Feasibility of Post-Quantum Cryptography on Small Devices
    Malina, Lukas
    Popelova, Lucie
    Dzurenda, Petr
    Hajny, Jan
    Martinasek, Zdenek
    IFAC PAPERSONLINE, 2018, 51 (06): : 462 - 467
  • [39] LETTERS FOR POST-QUANTUM CRYPTOGRAPHY STANDARD EVALUATION
    Ding, Jintai
    Mesnager, Sihem
    Wang, Lih-Chung
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (01) : I - I
  • [40] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748