Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices

被引:3
作者
Chikouche, Noureddine [1 ,2 ]
Ghadbane, Abderrahmen [2 ]
机构
[1] Univ Msila, Lab Pure & Appl Math, Msila, Algeria
[2] Univ Msila, Comp Sci Dept, Msila, Algeria
来源
CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA | 2018年 / 11195卷
关键词
Post-quantum cryptography; Public-key encryption; Public key signature; Performance; Mobile devices; MCELIECE; NTRU; CRYPTOSYSTEMS; RAINBOW; SCHEME;
D O I
10.1007/978-3-030-02131-3_9
中图分类号
F [经济];
学科分类号
02 ;
摘要
The classical public-key schemes are based on number theory, such as integer factorization and discrete logarithm. In 1994, P.W. Shor proposed an algorithm to solve these problems in polynomial time using quantum computers. Recent advancements in quantum computing open the door to the possibility of developing quantum computers sophisticated enough to solve these problems. Post-quantum cryptography (PQC) is resistant against quantum attacks. The aim of this paper is to evaluate the performance of different post-quantum public-key schemes for constrained-resources smart mobile devices; and to give a comparison between the studied post-quantum schemes in terms of computational time, required memory, and power consumption.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 32 条
[1]  
[Anonymous], CRYPT TOD
[2]  
[Anonymous], NTRUPRIME REDUCING A
[3]  
[Anonymous], 1978, PUBLIC KEY CRYPTOSYS
[4]  
[Anonymous], 1 INT S INF ITS APPL
[5]  
[Anonymous], 1994, PROC 35 ANN S FDN CO, DOI DOI 10.1109/SFCS.1994.365700
[6]  
[Anonymous], 2016, REPORT POSTQUANTUM C
[7]  
[Anonymous], 16 CENTR EUR C CRYPT
[8]  
Berger TP, 2009, LECT NOTES COMPUT SC, V5580, P77, DOI 10.1007/978-3-642-02384-2_6
[9]  
Bernstein DJ, 2013, LECT NOTES COMPUT SC, V8086, P250, DOI 10.1007/978-3-642-40349-1_15
[10]  
Buchmann J, 2011, LECT NOTES COMPUT SC, V7071, P117, DOI 10.1007/978-3-642-25405-5_8