Post-quantum cryptosystems for internet-of-things: A survey on lattice-based algorithms

Asif, Rameez (2021) Post-quantum cryptosystems for internet-of-things: A survey on lattice-based algorithms. IoT, 2 (1). pp. 71-91. ISSN 2624-831X

[thumbnail of Published manuscript]
PDF (Published manuscript) - Published Version
Available under License Creative Commons Attribution.

Download (919kB) | Preview


The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost instantaneously compared to the billions of years of computation needed by traditional computing machines. Researchers advocate the development of novel strategies to include data encryption in the post-quantum era. Lattices have been widely used in cryptography, somewhat peculiarly, and these algorithms have been used in both; (a) cryptoanalysis by using lattice approximation to break cryptosystems; and (b) cryptography by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions. Most of the dominant features of lattice-based cryptography (LBC), which holds it ahead in the post-quantum league, include resistance to quantum attack vectors, high concurrent performance, parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. While these methods offer possible security for classical cryptosytems in theory and experimentation, their implementation in energy-restricted Internet-of-Things (IoT) devices requires careful study of regular lattice-based implantation and its simplification in lightweight lattice-based cryptography (LW-LBC). This streamlined post-quantum algorithm is ideal for levelled IoT device security. The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.

Item Type: Article
Uncontrolled Keywords: internet-of-things,communication systems,cryptography,cybersecurity,encryption,quantum processing,computer science (miscellaneous),engineering (miscellaneous),electrical and electronic engineering ,/dk/atira/pure/subjectarea/asjc/1700/1701
Faculty \ School: Faculty of Science > School of Computing Sciences
UEA Research Groups: Faculty of Science > Research Groups > Smart Emerging Technologies
Faculty of Science > Research Groups > Cyber Security Privacy and Trust Laboratory
Related URLs:
Depositing User: LivePure Connector
Date Deposited: 25 Jan 2022 17:30
Last Modified: 29 Mar 2023 09:31
DOI: 10.3390/iot2010005


Downloads per month over past year

Actions (login required)

View Item View Item