Post Quantum Public and Private Key Cryptography Optimized for IoT Security
Journal article
Authors | Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik |
---|---|
Abstract | The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by the use of Shor’s algorithm. Thus, there is a need for making Quantum Secure Cryptography Algorithms that can be utilized in 5G IoT environments. In this paper, we propose algorithms to efficiently encrypt data streams in a 5G enabled IoT environment and we establish their proof of hardness and security against quantum attacks, eavesdropping, chosen plaintext attacks, chosen ciphertext attacks, and public key attacks. The proposed algorithm is compared to leading NIST-approved post-quantum (PQ) cryptography algorithms like LWE, LIZARD, and NTRU. On the basis of the total time taken to perform operations, our symmetric algorithm is 70 times faster than the aforementioned symmetric algorithms and our asymmetric algorithm is 10 times faster than the above-stated asymmetric algorithms. Both our algorithms use 6000 times lesser memory than the algorithms mentioned above. The proposed algorithms provide a complete security framework for IoT devices against quantum attacks. |
Keywords | Internet of Things (IoT); Quantum computers; Public-Key cryptography (PKC) |
Year | 2022 |
Journal | Wireless Personal Communications |
Journal citation | 129, pp. 893-909 |
Publisher | Springer |
ISSN | 0929-6212 |
1572-834X | |
Digital Object Identifier (DOI) | https://doi.org/10.1007/s11277-022-10162-w |
Web address (URL) | http://dx.doi.org/10.1007/s11277-022-10162-w |
Output status | Published |
Publication dates | 28 Dec 2022 |
Publication process dates | |
Accepted | 15 Dec 2022 |
Deposited | 10 Jul 2024 |
https://repository.derby.ac.uk/item/q7434/post-quantum-public-and-private-key-cryptography-optimized-for-iot-security
30
total views0
total downloads1
views this month0
downloads this month