TY - JOUR
T1 - Securing M2M with post-quantum public-key cryptography
AU - Shih, Jie Ren
AU - Hu, Yongbo
AU - Hsiao, Ming Chun
AU - Chen, Ming Shing
AU - Shen, Wen Chung
AU - Yang, Bo Yin
AU - Wu, An Yeu
AU - Cheng, Chen Mou
PY - 2013
Y1 - 2013
N2 - In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too 'expensive' for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.
AB - In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too 'expensive' for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.
KW - Bluespec SystemVerilog
KW - lattice-based cryptography
KW - multivariate cryptography
UR - http://www.scopus.com/inward/record.url?scp=84874950120&partnerID=8YFLogxK
U2 - 10.1109/JETCAS.2013.2244772
DO - 10.1109/JETCAS.2013.2244772
M3 - 文章
AN - SCOPUS:84874950120
SN - 2156-3357
VL - 3
SP - 106
EP - 116
JO - IEEE Journal on Emerging and Selected Topics in Circuits and Systems
JF - IEEE Journal on Emerging and Selected Topics in Circuits and Systems
IS - 1
M1 - 6472114
ER -