Post Quantum Public and Private Key Cryptography Optimized for IoT Security

Journal article


Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik 2022. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Personal Communications. 129, pp. 893-909. https://doi.org/10.1007/s11277-022-10162-w
AuthorsAjay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik
Abstract

The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by the use of Shor’s algorithm. Thus, there is a need for making Quantum Secure Cryptography Algorithms that can be utilized in 5G IoT environments. In this paper, we propose algorithms to efficiently encrypt data streams in a 5G enabled IoT environment and we establish their proof of hardness and security against quantum attacks, eavesdropping, chosen plaintext attacks, chosen ciphertext attacks, and public key attacks. The proposed algorithm is compared to leading NIST-approved post-quantum (PQ) cryptography algorithms like LWE, LIZARD, and NTRU. On the basis of the total time taken to perform operations, our symmetric algorithm is 70 times faster than the aforementioned symmetric algorithms and our asymmetric algorithm is 10 times faster than the above-stated asymmetric algorithms. Both our algorithms use 6000 times lesser memory than the algorithms mentioned above. The proposed algorithms provide a complete security framework for IoT devices against quantum attacks.

KeywordsInternet of Things (IoT); Quantum computers; Public-Key cryptography (PKC)
Year2022
JournalWireless Personal Communications
Journal citation129, pp. 893-909
PublisherSpringer
ISSN0929-6212
1572-834X
Digital Object Identifier (DOI)https://doi.org/10.1007/s11277-022-10162-w
Web address (URL)http://dx.doi.org/10.1007/s11277-022-10162-w
Output statusPublished
Publication dates28 Dec 2022
Publication process dates
Accepted15 Dec 2022
Deposited10 Jul 2024
Permalink -

https://repository.derby.ac.uk/item/q7434/post-quantum-public-and-private-key-cryptography-optimized-for-iot-security

  • 30
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Sign Language Recognition System Using Artificial Intelligence
Dahiya, R., Dwivedi, N., Singh Rathore, A., Kalra, M., Chauhan, P., Ajay Kaushik and Sharma, R. 2024. A Sign Language Recognition System Using Artificial Intelligence. ISBM: World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_7
Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm
Parashar, K., Ajay Kaushik, Sharma, R. and Aman 2024. Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm. in: So In, C., Londhe, N. D., Bhatt, N. and Kitsing, M. (ed.) Information Systems for Intelligent Systems: Proceedings of ISBM 2023 Singapore Springer. pp. 167-180
An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis
Anil Tak, Sarthak Jain, B. N. V. Gnandeep, Mradul, Nikhil Kaushik, Yogendra, Ajay Kaushik, Ritu Sharma and Aman 2024. An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis. World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_8
A novel intrusion detection system for internet of things devices and data
Kaushik, A. and Al-Raweshidy, H. 2023. A novel intrusion detection system for internet of things devices and data. Wireless Networks. 30, pp. 285-294. https://doi.org/10.1007/s11276-023-03435-0
A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems
Kaushik, A. and Al-Raweshidy, H. 2022. A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems. IEEE Access. 10, pp. 87974 - 87989. https://doi.org/10.1109/access.2022.3200035
A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems
Ajay Kaushik and Raj, S. V. 2022. A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems. The 5th International Conference on Research in Humanities. Diamond Scientific Publishing . https://doi.org/10.33422/5th.icrhconf.2022.08.200
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices
Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik and Alok Kumar Singh 2020. Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. International Conference on Information and Communication Technology for Intelligent Systems. Springer. https://doi.org/10.1007/978-981-15-7062-9_54
A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks
Ajay Kaushik, Goswami, M., Manuja, M., Sreedevi, I. and Gupta, D. 2020. A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 113, pp. 263-297. https://doi.org/10.1007/s11277-020-07188-3
A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement. Wireless Personal Communications. 105, pp. 1143-1167. https://doi.org/10.1007/s11277-019-06140-4
Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization. International Journal of Mobile Computing and Multimedia Communications. 10 (3), pp. 1-22. https://doi.org/10.4018/ijmcmc.2019070101
A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 106, pp. 1429-1449. https://doi.org/10.1007/s11277-019-06223-2
A Self-Configurable Event Coverage Approach for Wireless Sensor Networks
Ajay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S. 2019. A Self-Configurable Event Coverage Approach for Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications. 10 (2), pp. 1-18. https://doi.org/10.4018/ijmcmc.2019040101
Nature-Inspired Algorithms in Wireless Sensor Networks
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Nature-Inspired Algorithms in Wireless Sensor Networks. in: Banati, H., Mehta, S. and Kaur, P. (ed.) Nature-Inspired Algorithms for Big Data Frameworks Hershey, Pennsylvania IGI Global. pp. 75-92
Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2018. Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization. Applications of Computing and Communication Technologies First International Conference, ICACCT 2018. Springer. https://doi.org/10.1007/978-981-13-2035-4_23
A novel load balanced energy conservation approach in WSN using biogeography based optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2017. A novel load balanced energy conservation approach in WSN using biogeography based optimization. THE 2ND INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND SMART MATERIALS: ICEESM 2017. AIP Publishing. https://doi.org/10.1063/1.5002507
Technology transfer: enablers and barriers - a review
Ajay Kaushik, Kumar, S., Luthra, S. and Haleem, A. 2014. Technology transfer: enablers and barriers - a review. International Journal of Technology, Policy and Management. 14 (2), pp. 133-159. https://doi.org/10.1504/ijtpm.2014.060152