Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device

被引:5
|
作者
Barton, Jon [1 ]
Buchanan, William J. [1 ]
Pitropakis, Nikolaos [1 ]
Sayeed, Sarwar [1 ]
Abramson, Will [1 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Blockpass ID Lab, Edinburgh, Midlothian, Scotland
关键词
Post Quantum Cryptography; Cryptography; IoT; R-PI;
D O I
10.5220/0010903000003120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing make Shor's algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method. For a cryptographic system to remain secure against a quantum adversary, we need to build methods based on a hard mathematical problem, which are not susceptible to Shor's algorithm and create Post Quantum Cryptography (PQC). While high-powered computing devices may be able to run these new methods, we need to investigate how well these methods run on limited powered devices. This paper outlines an evaluation framework for PQC within constrained devices, and contributes to the area by providing benchmarks of the front-running algorithms on a popular single-board low-power device. It also introduces a set of five notions which can be considered to determine the robustness of particular algorithms.
引用
收藏
页码:551 / 561
页数:11
相关论文
共 50 条
  • [1] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91
  • [2] Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
    Fitzgibbon, Gregory
    Ottaviani, Carlo
    CRYPTOGRAPHY, 2024, 8 (02)
  • [3] Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance
    Doering, Ronny
    Geitz, Marc
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [4] SSL/TLS with Quantum Cryptography
    Pivk, Mario
    Kollmitzer, Christian
    Rass, Stefan
    ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 96 - +
  • [5] Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography
    Garcia, Carlos Rubio
    Aguilera, Abraham Cano
    Olmos, Juan Jose Vegas
    Monroy, Idelfonso Tafur
    Rommel, Simon
    2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023, 2023, : 246 - 251
  • [6] Accelerating Post-Quantum Cryptography using an Energy-Efficient TLS Crypto-Processor
    Banerjee, Utsav
    Das, Siddharth
    Chandrakasan, Anantha P.
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [7] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [8] Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
    Tasopoulos, George
    Li, Jinhui
    Fournaris, Apostolos P.
    Zhao, Raymond K.
    Sakzad, Amin
    Steinfeld, Ron
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 432 - 451
  • [9] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [10] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194