From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things

被引:131
作者
Fernandez-Carames, Tiago M. [1 ]
机构
[1] Univ A Coruna, Dept Comp Engn, Fac Comp Sci, Ctr Invest CITIC, La Coruna 15071, Spain
关键词
Internet of Things; Elliptic curve cryptography; Quantum computing; Computers; Internet of Things (IoT); IoT security; post-quantum; quantum-resistant; quantum-safe; HEALTH-CARE; MCELIECE; BLOCKCHAIN; SIGNATURES; ALGORITHM; ISOGENIES; SCHEME;
D O I
10.1109/JIOT.2019.2958788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although quantum computing is still in its nascent age, its evolution threatens the most popular public-key encryption systems. Such systems are essential for today's Internet security due to their ability for solving the key distribution problem and for providing high security in insecure communications channels that allow for accessing websites or for exchanging e-mails, financial transactions, digitally signed documents, military communications or medical data. Cryptosystems like Rivest-Shamir-Adleman (RSA), elliptic curve cryptography (ECC) or Diffie-Hellman have spread worldwide and are part of diverse key Internet standards like Transport Layer Security (TLS), which are used both by traditional computers and Internet of Things (IoT) devices. It is especially difficult to provide high security to IoT devices, mainly because many of them rely on batteries and are resource constrained in terms of computational power and memory, which implies that specific energy-efficient and lightweight algorithms need to be designed and implemented for them. These restrictions become relevant challenges when implementing cryptosystems that involve intensive mathematical operations and demand substantial computational resources, which are often required in applications where data privacy has to be preserved for the long term, like IoT applications for defense, mission-critical scenarios or smart healthcare. Quantum computing threatens such a long-term IoT device security and researchers are currently developing solutions to mitigate such a threat. This article provides a survey on what can be called post-quantum IoT systems (IoT systems protected from the currently known quantum computing attacks): the main post-quantum cryptosystems and initiatives are reviewed, the most relevant IoT architectures and challenges are analyzed, and the expected future trends are indicated. Thus, this article is aimed at providing a wide view of post-quantum IoT security and give useful guidelines to the future post-quantum IoT developers.
引用
收藏
页码:6457 / 6480
页数:24
相关论文
共 162 条
[1]  
Abdalla M, 2002, LECT NOTES COMPUT SC, V2332, P418
[2]   Efficient Encryption From Random Quasi-Cyclic Codes [J].
Aguilar-Melchor, Carlos ;
Blazy, Olivier ;
Deneuville, Jean-Christophe ;
Gaborit, Philippe ;
Zemor, Gilles .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) :3927-3943
[3]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[4]   Data Fusion and IoT for Smart Ubiquitous Environments: A Survey [J].
Alam, Furqan ;
Mehmood, Rashid ;
Katib, Iyad ;
Albogami, Nasser N. ;
Albeshri, Aiiad .
IEEE ACCESS, 2017, 5 :9533-9554
[5]  
Alkim E., 2016, P 6 C SEC PRIV APPL, P273
[6]  
Alkim E., 2016, IACR CRYPTOLOGY EPRI
[7]  
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[8]  
[Anonymous], 2009, IEEE Standard 1363.1-2008
[9]  
[Anonymous], 2016, IR8105 NAT I STAND T
[10]  
[Anonymous], P IWAP TAIP TAIW OCT