Next Article in Journal
Can Ternary Computing Improve Information Assurance?
Next Article in Special Issue
Robust Secure Authentication and Data Storage with Perfect Secrecy
Previous Article in Journal
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Previous Article in Special Issue
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(1), 5; https://doi.org/10.3390/cryptography2010005

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

VTT Technical Research Centre of Finland, P.O. Box 1000, FI-02044 Espoo, Finland
*
Author to whom correspondence should be addressed.
Received: 22 December 2017 / Revised: 19 January 2018 / Accepted: 2 February 2018 / Published: 7 February 2018
(This article belongs to the Special Issue Physical Security in a Cryptographic Enviroment)
Full-Text   |   PDF [837 KB, uploaded 7 February 2018]   |  

Abstract

The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices. View Full-Text
Keywords: communication; security; physical layer security; secrecy coding; post-quantum cryptography; energy-efficiency; Internet of Things (IoT); simulation communication; security; physical layer security; secrecy coding; post-quantum cryptography; energy-efficiency; Internet of Things (IoT); simulation
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Suomalainen, J.; Kotelba, A.; Kreku, J.; Lehtonen, S. Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. Cryptography 2018, 2, 5.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top