Edge Computing; Internet of Things; IoT-Security; Post-Quantum Cryptography; Lattice-Based Cryptography; Efficient Implementation
Abstract :
[en] In order to increase the security of edge computing, all data transmitted to and from edge devices, as well as all data stored on edge devices, must be encrypted. Especially when the transmitted or stored data contains sensitive personal information, long-term protection over periods of ten or more years may be required, which can only be achieved with post-quantum cryptography. This paper first gives a brief overview of post-quantum public-key cryptosystems based on hard mathematical problems related to hash functions, error-correcting codes, multivariate quadratic systems, and lattices. Then, the suitability of lattice-based cryptosystems for resource-constrained devices is discussed and efficient implementations for 8 and 32-bit microcontrollers are outlined.
Disciplines :
Computer science
Author, co-author :
Liu, Zhe ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
Choo, Kim-Kwang Raymond; The University of Texas at San Antonio > Department of Information Systems and Cyber Security
Groszschädl, Johann ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Publication date :
February 2018
Journal title :
IEEE Communications Magazine
ISSN :
1558-1896
Publisher :
Communications Society of Institute of Electrical and Electronics Engineers, New York, United States - New York