{"title":"NTRU and RSA Cryptosystems for Data Security in IoT Environment","authors":"Ankitha Nandanavanam, Ipsita Upasana, Nanditha Nandanavanam","doi":"10.1109/ICSTCEE49637.2020.9277159","DOIUrl":null,"url":null,"abstract":"The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy. There are various cryptographic algorithms available today that can secure messages and data being communicated. Symmetric cryptography, though simple, does not provide authorization efficiently. Asymmetric cryptography proves to be more secure as it provides all the components of information security.With the breakthrough development on the Internet-of- Things (IOT), any digital device can become an originator of data. The main concern which arises is how to protect these data. With an accelerated usage of IoT environment, the security of data collected and stored by these devices has become more crucial.In this paper, we discuss two asymmetric algorithms NTRU (Nth degree truncated polynomial ring) and RSA (Rivest- Shamir-Adleman) in context of IoT. RSA is widely used but is heavy on key size and computation complexity. On the other hand, NTRU can give the same level of bit security with comparative key size and very less computational complexity. The captivity of NTRU algorithm lies in the fact that it works on simple polynomial operations. It is a NP-hard problem based on shortest vector problem (SVP) and is secure even for future quantum attacks. In a resource constrained environment like IoT environment, the performance of RSA and NTRU has been analyzed on the various security level parameters, viz. key generation, encryption and decryption time. Furthermore, performance of the various parameters has also been analyzed on various bits size plain text.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSTCEE49637.2020.9277159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy. There are various cryptographic algorithms available today that can secure messages and data being communicated. Symmetric cryptography, though simple, does not provide authorization efficiently. Asymmetric cryptography proves to be more secure as it provides all the components of information security.With the breakthrough development on the Internet-of- Things (IOT), any digital device can become an originator of data. The main concern which arises is how to protect these data. With an accelerated usage of IoT environment, the security of data collected and stored by these devices has become more crucial.In this paper, we discuss two asymmetric algorithms NTRU (Nth degree truncated polynomial ring) and RSA (Rivest- Shamir-Adleman) in context of IoT. RSA is widely used but is heavy on key size and computation complexity. On the other hand, NTRU can give the same level of bit security with comparative key size and very less computational complexity. The captivity of NTRU algorithm lies in the fact that it works on simple polynomial operations. It is a NP-hard problem based on shortest vector problem (SVP) and is secure even for future quantum attacks. In a resource constrained environment like IoT environment, the performance of RSA and NTRU has been analyzed on the various security level parameters, viz. key generation, encryption and decryption time. Furthermore, performance of the various parameters has also been analyzed on various bits size plain text.