Skip to main content
Log in

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by the use of Shor’s algorithm. Thus, there is a need for making Quantum Secure Cryptography Algorithms that can be utilized in 5G IoT environments. In this paper, we propose algorithms to efficiently encrypt data streams in a 5G enabled IoT environment and we establish their proof of hardness and security against quantum attacks, eavesdropping, chosen plaintext attacks, chosen ciphertext attacks, and public key attacks. The proposed algorithm is compared to leading NIST-approved post-quantum (PQ) cryptography algorithms like LWE, LIZARD, and NTRU. On the basis of the total time taken to perform operations, our symmetric algorithm is 70 times faster than the aforementioned symmetric algorithms and our asymmetric algorithm is 10 times faster than the above-stated asymmetric algorithms. Both our algorithms use 6000 times lesser memory than the algorithms mentioned above. The proposed algorithms provide a complete security framework for IoT devices against quantum attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kumar, P., Bagga, H., Netam, B. S., & Uduthalapally, V. (2022). Sad-iot: Security analysis of ddos attacks in iot networks. Wireless Personal Communications, 122(1), 87–108.

    Article  Google Scholar 

  2. Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S., & Arshad, H. (2021). A review on the security of the internet of things: Challenges and solutions. Wireless Personal Communications, 119(3), 2603–2637.

    Article  Google Scholar 

  3. Magaia, N., Fonseca, R., Muhammad, K., Segundo, A. H. F. N., Neto, A. V. L., & de Albuquerque, V. H. C. (2020). Industrial internet-of-things security enhanced with deep learning approaches for smart cities. IEEE Internet of Things Journal, 8(8), 6393–6405.

    Article  Google Scholar 

  4. Rezaeibagha, F., Mu, Y., Huang, K., & Chen, L. (2020). Secure and efficient data aggregation for IoT monitoring systems. IEEE Internet of Things Journal, 8(10), 8056–8063.

    Article  Google Scholar 

  5. CA USA Symantec, Mountain View. Symantec Internet Security Threat Report. www.symantec.com/content/dam/symantec/ docs/reports/istr-23-2018-en.pdf, (2018). [Online; accessed Jun-2018].

  6. Hossain, M., Noor, S., & Hasan, R. (2017). HSC-IoT: A hardware and software co-verification based authentication scheme for Internet of Things. In 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (pp. 109–116). IEEE.

  7. Perlner, R.A., & David A Cooper, D.A. (2009). Quantum resistant public key cryptography: A survey. In Proceedings of the 8th Symposium on Identity and Trust on the Internet, pp. 85–93.

  8. Bernstein, D. J. (2009). Introduction to post-quantum cryptography. In Post-quantum cryptography (pp. 1–14). Springer, Berlin, Heidelberg.

  9. Google AI. Quantum supremacy using a programmable superconducting processor. https://ai.googleblog.com/2019/10/quantum-supremacy-using-programmable.html.

  10. Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography (Vol. 12). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology.

    Book  Google Scholar 

  11. Kaushik, A., Goswami, M., Manuja, M., Indu, S., & Gupta, D. (2020). A binary PSO approach for improving the performance of wireless sensor networks. Wireless Personal Communications, 113(1), 263–297.

    Article  Google Scholar 

  12. Kaushik, A., Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R., & Yadav, S. (2019). A self-configurable event coverage approach for wireless sensor networks. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 10(2), 1–18.

    Article  Google Scholar 

  13. Antony, S. M., Indu, S., & Pandey, R. (2020). An efficient solar energy harvesting system for wireless sensor network nodes. Journal of Information and Optimization Sciences, 41(1), 39–50.

    Article  Google Scholar 

  14. Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 1–40.

    Article  MathSciNet  MATH  Google Scholar 

  15. Cheon, J.H., Kim, D., Lee, J., & Song, Y. (2018). Lizard: Cut off the tail! a practical post-quantum public-key encryption from lwe and lwr. In International Conference on Security and Cryptography for Networks, (pp. 160–177). Springer.

  16. Hoffstein, J., Jill Pipher, J., & Silverman, J.H. (1998). Ntru: A ring-based public key cryptosystem. In International Algorithmic Number Theory Symposium, (pp 267–288). Springer.

  17. Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J. H., & Whyte, W. Ntrusign: Digital signatures using the ntru lattice. In Cryptographers’ at the RSA Conference, pp 122–140. Springer, (2003).

  18. Ajtai, M., Kumar, R., & Sivakumar, D. (2001). A sieve algorithm for the shortest lattice vector problem. In Proceedings of the thirty-third annual ACM symposium on Theory of computing, (pp. 601–610).

  19. Micciancio, D., & Regev, O. (2009). Lattice-based cryptography. In Post-quantum cryptography, (pp. 147–191). Springer.

  20. Regev, O. (2010). The learning with errors problem. Invited survey in CCC, 7, 30.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ajay Kaushik or S. Indu Role - Corresponding Author.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaushik, A., Vadlamani, L.S.S., Hussain, M.M. et al. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Pers Commun 129, 893–909 (2023). https://doi.org/10.1007/s11277-022-10162-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10162-w

Keywords

Navigation