Jon Barton
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
Barton, Jon; Pitropakis, Nikolaos; Buchanan, William; Sayeed, Sarwar; Abramson, Will
Authors
Dr Nick Pitropakis N.Pitropakis@napier.ac.uk
Associate Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Sarwar Sayeed
Will Abramson
Abstract
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method. For a cryptographic system to remain secure against a quantum adversary, we need to build methods based on a hard mathematical problem, which are not susceptible to Shor’s algorithm and create Post Quantum Cryptography (PQC). While high-powered computing devices may be able to run these new methods, we need to investigate how well these methods run on limited powered devices. This paper outlines an evaluation framework for PQC within constrained devices, and contributes to the area by providing benchmarks of the front-running algorithms on a popular single-board low-power device. It also introduces a set of five notions which can be considered to determine the robustness of particular algorithms.
Citation
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022, February). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. Presented at 8th International Conference on Information Systems Security and Privacy, Online
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 8th International Conference on Information Systems Security and Privacy |
Start Date | Feb 9, 2022 |
End Date | Feb 11, 2022 |
Publication Date | 2022 |
Deposit Date | Mar 13, 2022 |
Publicly Available Date | Jun 26, 2023 |
Pages | 551-561 |
Book Title | Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP |
ISBN | 978-989-758-553-1 |
DOI | https://doi.org/10.5220/0010903000003120 |
Keywords | Post Quantum Cryptography, Cryptography, IoT, R-PI |
Public URL | http://researchrepository.napier.ac.uk/Output/2853534 |
Publisher URL | https://www.scitepress.org/PublicationsDetail.aspx?ID=+JwuMVvseRM=&t=1 |
Files
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
(474 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
Towards The Creation Of The Future Fish Farm
(2023)
Journal Article
Using Social Media & Sentiment Analysis to Make Investment Decisions
(2022)
Journal Article