首页> 外文期刊>Emerging and Selected Topics in Circuits and Systems, IEEE Journal on >Securing M2M With Post-Quantum Public-Key Cryptography
【24h】

Securing M2M With Post-Quantum Public-Key Cryptography

机译:使用量化后的公钥加密技术保护M2M

获取原文
获取原文并翻译 | 示例
       

摘要

In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too “expensive” for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.
机译:在本文中,我们介绍了两种后量子公共密钥密码系统(PKC)的ASIC实现:NTRUEncrypt和TTS。它代表着使用强大的硬件辅助PKC保护机器对机器(M2M)系统的第一步。与传统的观点认为PKC对于M2M传感器来说“太贵”相比,由于节省了供应,部署,操作,维护和一般管理方面的成本,它实际上可以降低总拥有成本。此外,PKC可以更节能,因为基于PKC的安全协议通常比基于对称密钥的协议涉及更少的通信,并且与计算相比,通信变得越来越昂贵。更重要的是,最近的算法进步带来了几种新的PKC,包括NTRUEncrypt和TTS,它们比RSA等传统PKC的效率高出几个数量级。因此,本文的主要目标是证明使用基于硬件的PKC在M2M应用程序中提供常规数据安全性的可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号