Your browser doesn't support javascript.
loading
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
Septien-Hernandez, Jose-Antonio; Arellano-Vazquez, Magali; Contreras-Cruz, Marco Antonio; Ramirez-Paredes, Juan-Pablo.
Afiliação
  • Septien-Hernandez JA; Department of Electronics Engineering, Campus Irapuato-Salamanca, University of Guanajuato, Carr. Salamanca-Valle de Santiago km 3.5 + 1.8, Comunidad de Palo Blanco, Salamanca 36885, Mexico.
  • Arellano-Vazquez M; INFOTEC, Cto. Tecnopolo Sur No. 112, Aguascalientes 14050, Mexico.
  • Contreras-Cruz MA; Department of Electronics Engineering, Campus Irapuato-Salamanca, University of Guanajuato, Carr. Salamanca-Valle de Santiago km 3.5 + 1.8, Comunidad de Palo Blanco, Salamanca 36885, Mexico.
  • Ramirez-Paredes JP; Department of Electronics Engineering, Campus Irapuato-Salamanca, University of Guanajuato, Carr. Salamanca-Valle de Santiago km 3.5 + 1.8, Comunidad de Palo Blanco, Salamanca 36885, Mexico.
Sensors (Basel) ; 22(2)2022 Jan 09.
Article em En | MEDLINE | ID: mdl-35062450
ABSTRACT
The existence of quantum computers and Shor's algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the Internet, and it involves the connection of millions of low-powered and resource-constrained devices to the network. Because quantum computers are becoming more capable, the creation of a new cryptographic standard that cannot be compromised by them is indispensable. There are several current proposals of quantum-resistant or post-quantum algorithms that are being considered for future standards. Given that the IoT is increasing in popularity, and given its resource-constrained nature, it is worth adapting those new standards to IoT devices. In this work, we study some post-quantum cryptosystems that could be suitable for IoT devices, adapting them to work with current cryptography and communication software, and conduct a performance measurement on them, obtaining guidelines for selecting the best for different applications in resource-constrained hardware. Our results show that many of these algorithms can be efficiently executed in current IoT hardware, providing adequate protection from the attacks that quantum computers will eventually be capable of.
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2022 Tipo de documento: Article País de afiliação: México País de publicação: CH / SUIZA / SUÍÇA / SWITZERLAND

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2022 Tipo de documento: Article País de afiliação: México País de publicação: CH / SUIZA / SUÍÇA / SWITZERLAND