Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

    Research output: Contribution to journalArticleScientificpeer-review

    Abstract

    The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.
    Original languageEnglish
    Article number5
    Number of pages20
    JournalCryptography
    Volume2
    Issue number1
    DOIs
    Publication statusPublished - 7 Feb 2018
    MoE publication typeA1 Journal article-refereed

    Fingerprint

    Quantum computers
    Communication
    Energy efficiency
    Energy utilization
    Network protocols
    Internet of things

    Keywords

    • communication
    • security
    • physical layer security
    • secrecy coding
    • post-quantum cryptography
    • energy-efficiency
    • Internet of Things (IoT)
    • simulation

    Cite this

    @article{fb5738e211994cafae57287502c945a0,
    title = "Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT",
    abstract = "The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.",
    keywords = "communication, security, physical layer security, secrecy coding, post-quantum cryptography, energy-efficiency, Internet of Things (IoT), simulation",
    author = "Jani Suomalainen and Adrian Kotelba and Jari Kreku and Sami Lehtonen",
    year = "2018",
    month = "2",
    day = "7",
    doi = "10.3390/cryptography2010005",
    language = "English",
    volume = "2",
    journal = "Cryptography",
    issn = "2410-387X",
    publisher = "MDPI",
    number = "1",

    }

    Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. / Suomalainen, Jani; Kotelba, Adrian; Kreku, Jari; Lehtonen, Sami.

    In: Cryptography, Vol. 2, No. 1, 5, 07.02.2018.

    Research output: Contribution to journalArticleScientificpeer-review

    TY - JOUR

    T1 - Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

    AU - Suomalainen, Jani

    AU - Kotelba, Adrian

    AU - Kreku, Jari

    AU - Lehtonen, Sami

    PY - 2018/2/7

    Y1 - 2018/2/7

    N2 - The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.

    AB - The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices.

    KW - communication

    KW - security

    KW - physical layer security

    KW - secrecy coding

    KW - post-quantum cryptography

    KW - energy-efficiency

    KW - Internet of Things (IoT)

    KW - simulation

    U2 - 10.3390/cryptography2010005

    DO - 10.3390/cryptography2010005

    M3 - Article

    VL - 2

    JO - Cryptography

    JF - Cryptography

    SN - 2410-387X

    IS - 1

    M1 - 5

    ER -