Securing M2M with post-quantum public-key cryptography

Jie Ren Shih*, Yongbo Hu, Ming Chun Hsiao, Ming Shing Chen, Wen Chung Shen, Bo Yin Yang, An Yeu Wu, Chen Mou Cheng

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

21 Scopus citations

Abstract

In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too 'expensive' for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.

Original languageEnglish
Article number6472114
Pages (from-to)106-116
Number of pages11
JournalIEEE Journal on Emerging and Selected Topics in Circuits and Systems
Volume3
Issue number1
DOIs
StatePublished - 2013
Externally publishedYes

Keywords

  • Bluespec SystemVerilog
  • lattice-based cryptography
  • multivariate cryptography

Fingerprint

Dive into the research topics of 'Securing M2M with post-quantum public-key cryptography'. Together they form a unique fingerprint.

Cite this