Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

Research output: Contribution to journalArticleScientificpeer-review

Abstract

The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.
Original languageEnglish
Article number5
Number of pages20
JournalCryptography
Volume2
Issue number1
DOIs
Publication statusPublished - 7 Feb 2018
MoE publication typeA1 Journal article-refereed

Fingerprint

Quantum computers
Communication
Energy efficiency
Energy utilization
Network protocols
Internet of things

Keywords

  • communication
  • security
  • physical layer security
  • secrecy coding
  • post-quantum cryptography
  • energy-efficiency
  • Internet of Things (IoT)
  • simulation

Cite this

@article{fb5738e211994cafae57287502c945a0,
title = "Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT",
abstract = "The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.",
keywords = "communication, security, physical layer security, secrecy coding, post-quantum cryptography, energy-efficiency, Internet of Things (IoT), simulation",
author = "Jani Suomalainen and Adrian Kotelba and Jari Kreku and Sami Lehtonen",
year = "2018",
month = "2",
day = "7",
doi = "10.3390/cryptography2010005",
language = "English",
volume = "2",
journal = "Cryptography",
issn = "2410-387X",
publisher = "MDPI",
number = "1",

}

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. / Suomalainen, Jani; Kotelba, Adrian; Kreku, Jari; Lehtonen, Sami.

In: Cryptography, Vol. 2, No. 1, 5, 07.02.2018.

Research output: Contribution to journalArticleScientificpeer-review

TY - JOUR

T1 - Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

AU - Suomalainen, Jani

AU - Kotelba, Adrian

AU - Kreku, Jari

AU - Lehtonen, Sami

PY - 2018/2/7

Y1 - 2018/2/7

N2 - The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.

AB - The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.

KW - communication

KW - security

KW - physical layer security

KW - secrecy coding

KW - post-quantum cryptography

KW - energy-efficiency

KW - Internet of Things (IoT)

KW - simulation

U2 - 10.3390/cryptography2010005

DO - 10.3390/cryptography2010005

M3 - Article

VL - 2

JO - Cryptography

JF - Cryptography

SN - 2410-387X

IS - 1

M1 - 5

ER -