Cargando…
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications
The existence of quantum computers and Shor’s algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779321/ https://www.ncbi.nlm.nih.gov/pubmed/35062450 http://dx.doi.org/10.3390/s22020489 |
_version_ | 1784637547206410240 |
---|---|
author | Septien-Hernandez, Jose-Antonio Arellano-Vazquez, Magali Contreras-Cruz, Marco Antonio Ramirez-Paredes, Juan-Pablo |
author_facet | Septien-Hernandez, Jose-Antonio Arellano-Vazquez, Magali Contreras-Cruz, Marco Antonio Ramirez-Paredes, Juan-Pablo |
author_sort | Septien-Hernandez, Jose-Antonio |
collection | PubMed |
description | The existence of quantum computers and Shor’s algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the Internet, and it involves the connection of millions of low-powered and resource-constrained devices to the network. Because quantum computers are becoming more capable, the creation of a new cryptographic standard that cannot be compromised by them is indispensable. There are several current proposals of quantum-resistant or post-quantum algorithms that are being considered for future standards. Given that the IoT is increasing in popularity, and given its resource-constrained nature, it is worth adapting those new standards to IoT devices. In this work, we study some post-quantum cryptosystems that could be suitable for IoT devices, adapting them to work with current cryptography and communication software, and conduct a performance measurement on them, obtaining guidelines for selecting the best for different applications in resource-constrained hardware. Our results show that many of these algorithms can be efficiently executed in current IoT hardware, providing adequate protection from the attacks that quantum computers will eventually be capable of. |
format | Online Article Text |
id | pubmed-8779321 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87793212022-01-22 A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications Septien-Hernandez, Jose-Antonio Arellano-Vazquez, Magali Contreras-Cruz, Marco Antonio Ramirez-Paredes, Juan-Pablo Sensors (Basel) Article The existence of quantum computers and Shor’s algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the Internet, and it involves the connection of millions of low-powered and resource-constrained devices to the network. Because quantum computers are becoming more capable, the creation of a new cryptographic standard that cannot be compromised by them is indispensable. There are several current proposals of quantum-resistant or post-quantum algorithms that are being considered for future standards. Given that the IoT is increasing in popularity, and given its resource-constrained nature, it is worth adapting those new standards to IoT devices. In this work, we study some post-quantum cryptosystems that could be suitable for IoT devices, adapting them to work with current cryptography and communication software, and conduct a performance measurement on them, obtaining guidelines for selecting the best for different applications in resource-constrained hardware. Our results show that many of these algorithms can be efficiently executed in current IoT hardware, providing adequate protection from the attacks that quantum computers will eventually be capable of. MDPI 2022-01-09 /pmc/articles/PMC8779321/ /pubmed/35062450 http://dx.doi.org/10.3390/s22020489 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Septien-Hernandez, Jose-Antonio Arellano-Vazquez, Magali Contreras-Cruz, Marco Antonio Ramirez-Paredes, Juan-Pablo A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title | A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title_full | A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title_fullStr | A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title_full_unstemmed | A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title_short | A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications |
title_sort | comparative study of post-quantum cryptosystems for internet-of-things applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779321/ https://www.ncbi.nlm.nih.gov/pubmed/35062450 http://dx.doi.org/10.3390/s22020489 |
work_keys_str_mv | AT septienhernandezjoseantonio acomparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT arellanovazquezmagali acomparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT contrerascruzmarcoantonio acomparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT ramirezparedesjuanpablo acomparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT septienhernandezjoseantonio comparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT arellanovazquezmagali comparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT contrerascruzmarcoantonio comparativestudyofpostquantumcryptosystemsforinternetofthingsapplications AT ramirezparedesjuanpablo comparativestudyofpostquantumcryptosystemsforinternetofthingsapplications |