Title :
Securing M2M With Post-Quantum Public-Key Cryptography
Author :
Jie-Ren Shih ; Yongbo Hu ; Ming-Chun Hsiao ; Ming-Shing Chen ; Wen-Chung Shen ; Bo-Yin Yang ; An-Yeu Wu ; Chen-Mou Cheng
Author_Institution :
Intel-NTU Connected Context Comput. Center, Nat. Taiwan Univ., Taipei, Taiwan
Abstract :
In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too “expensive” for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.
Keywords :
application specific integrated circuits; cryptographic protocols; mobile communication; public key cryptography; telecommunication security; ASIC implementation; M2M security; M2M sensors; NTRUEncrypt; PKC-based security protocols; RSA; TTS; hardware-assisted PKC; machine-to-machine system security; post-quantum public key cryptography; post-quantum public-key cryptosystems; symmetric key-based counterparts; Bluespec SystemVerilog; lattice-based cryptography; multivariate cryptography;
Journal_Title :
Emerging and Selected Topics in Circuits and Systems, IEEE Journal on
DOI :
10.1109/JETCAS.2013.2244772