394 research outputs found

    Performance Analysis of NIST Round 2 Post-Quantum Cryptography Public-key Encryption and Key-establishment Algorithms on ARMv8 IoT Devices using SUPERCOP

    Get PDF
    With tens of billions of new IoT devices being utilized, and the advent of quantum computing, our future and our security needs are rapidly changing. While IoT devices have great potential to transform the way we live, they also have a number of serious problems centering on their security capabilities. Quantum computers capable of breaking today’s encryption are just around the corner, and we will need to securely communicate over the internet using the encryption of the future. Post-quantum public-key encryption and key-establishment algorithms may be the answer to address those concerns. This paper used the benchmarking toolkit SUPERCOP to analyze the performance of post-quantum public-key encryption and key-establishment algorithms on IoT devices that are using ARMv8 CPUs. The performance of the NIST round 2 algorithms were found to not be significantly different between the two ARMv8 devices

    Public key cryptosystems : theory, application and implementation

    Get PDF
    The determination of an individual's right to privacy is mainly a nontechnical matter, but the pragmatics of providing it is the central concern of the cryptographer. This thesis has sought answers to some of the outstanding issues in cryptography. In particular, some of the theoretical, application and implementation problems associated with a Public Key Cryptosystem (PKC).The Trapdoor Knapsack (TK) PKC is capable of fast throughput, but suffers from serious disadvantages. In chapter two a more general approach to the TK-PKC is described, showing how the public key size can be significantly reduced. To overcome the security limitations a new trapdoor was described in chapter three. It is based on transformations between the radix and residue number systems.Chapter four considers how cryptography can best be applied to multi-addressed packets of information. We show how security or communication network structure can be used to advantage, then proposing a new broadcast cryptosystem, which is more generally applicable.Copyright is traditionally used to protect the publisher from the pirate. Chapter five shows how to protect information when in easily copyable digital format.Chapter six describes the potential and pitfalls of VLSI, followed in chapter seven by a model for comparing the cost and performance of VLSI architectures. Chapter eight deals with novel architectures for all the basic arithmetic operations. These architectures provide a basic vocabulary of low complexity VLSI arithmetic structures for a wide range of applications.The design of a VLSI device, the Advanced Cipher Processor (ACP), to implement the RSA algorithm is described in chapter nine. It's heart is the modular exponential unit, which is a synthesis of the architectures in chapter eight. The ACP is capable of a throughput of 50 000 bits per second

    Key exchange with the help of a public ledger

    Full text link
    Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols
    • …
    corecore