物联网量子抵抗军刀组密钥交换协议

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Fouzia Samiullah;Ming-Lee Gan;Sedat Akleylek;Y. Aun
{"title":"物联网量子抵抗军刀组密钥交换协议","authors":"Fouzia Samiullah;Ming-Lee Gan;Sedat Akleylek;Y. Aun","doi":"10.1109/OJCOMS.2024.3516005","DOIUrl":null,"url":null,"abstract":"Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools. This process concentrates on deploying “key encapsulation mechanisms” and “signature schemes”, mainly focusing on Group Authenticated key exchange (GAKE), which is crucial for secure group communication while ensuring authentication is immune to quantum attacks. Despite various two-party key exchange designs adaptable for group key exchange protocols with multiple parties, experts face challenges in secure group interactions in a post-quantum environment due to the lack of such group protocols solutions. Addressing the necessity of secure group communication in IoTs, we proposed a GAKE protocol. This paper presents its design and implementation secure under QROM; we compared our initial findings on the “Saber-based GAKE” with a Kyber-based GAKE implementation named “Complied Kyber” proposed by Pablos, focusing on IoTs. Our findings show better efficiency than “Compiled Kyber” regarding overall communication duration, especially when involving up to 2000 participants in group communication. Furthermore, thorough investigation and calculations confirm the Saber-GAKE protocol’s interoperability with IoT contexts. The protocol has worthy computational efficiency, with execution speeds of 0.064 ms on ARM Cortex-M4 and 1.56 ms on ARM Cortex-M0 systems. The memory use is well below the allowed limits, with 50.86 KB on Cortex-M4 and 35.84 KB on Cortex-M0. The performance data validate that the Saber-GAKE protocol can effectively and safely function on IoT devices with limited resources, offering strong protection against quantum computing assaults.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"378-398"},"PeriodicalIF":6.3000,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10793121","citationCount":"0","resultStr":"{\"title\":\"Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT\",\"authors\":\"Fouzia Samiullah;Ming-Lee Gan;Sedat Akleylek;Y. Aun\",\"doi\":\"10.1109/OJCOMS.2024.3516005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools. This process concentrates on deploying “key encapsulation mechanisms” and “signature schemes”, mainly focusing on Group Authenticated key exchange (GAKE), which is crucial for secure group communication while ensuring authentication is immune to quantum attacks. Despite various two-party key exchange designs adaptable for group key exchange protocols with multiple parties, experts face challenges in secure group interactions in a post-quantum environment due to the lack of such group protocols solutions. Addressing the necessity of secure group communication in IoTs, we proposed a GAKE protocol. This paper presents its design and implementation secure under QROM; we compared our initial findings on the “Saber-based GAKE” with a Kyber-based GAKE implementation named “Complied Kyber” proposed by Pablos, focusing on IoTs. Our findings show better efficiency than “Compiled Kyber” regarding overall communication duration, especially when involving up to 2000 participants in group communication. Furthermore, thorough investigation and calculations confirm the Saber-GAKE protocol’s interoperability with IoT contexts. The protocol has worthy computational efficiency, with execution speeds of 0.064 ms on ARM Cortex-M4 and 1.56 ms on ARM Cortex-M0 systems. The memory use is well below the allowed limits, with 50.86 KB on Cortex-M4 and 35.84 KB on Cortex-M0. The performance data validate that the Saber-GAKE protocol can effectively and safely function on IoT devices with limited resources, offering strong protection against quantum computing assaults.\",\"PeriodicalId\":33803,\"journal\":{\"name\":\"IEEE Open Journal of the Communications Society\",\"volume\":\"6 \",\"pages\":\"378-398\"},\"PeriodicalIF\":6.3000,\"publicationDate\":\"2024-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10793121\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Open Journal of the Communications Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10793121/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10793121/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

量子计算对当前的加密方法构成了威胁,促使美国国家标准与技术研究所(NIST)标准化进程朝着开发后量子加密工具的方向发展。这个过程集中于部署“密钥封装机制”和“签名方案”,主要关注组认证密钥交换(GAKE),这是安全组通信的关键,同时确保身份验证不受量子攻击。尽管各种双方密钥交换设计适用于多方组密钥交换协议,但由于缺乏此类组协议解决方案,专家们在后量子环境中面临安全组交互的挑战。针对物联网中安全组通信的必要性,提出了一种GAKE协议。本文介绍了其在QROM下的安全设计与实现;我们将“基于saber的GAKE”的初步研究结果与Pablos提出的基于Kyber的GAKE实施方案“汇编Kyber”进行了比较,重点是物联网。我们的研究结果显示,在整体沟通持续时间方面,效率优于“汇编Kyber”,特别是在涉及多达2000名参与者的群体沟通时。此外,彻底的调查和计算证实了Saber-GAKE协议与物联网环境的互操作性。该协议具有相当的计算效率,在ARM Cortex-M4系统上的执行速度为0.064 ms,在ARM Cortex-M0系统上的执行速度为1.56 ms。内存使用远远低于允许的限制,在Cortex-M4上为50.86 KB,在Cortex-M0上为35.84 KB。性能数据验证了Saber-GAKE协议可以在资源有限的物联网设备上有效、安全地运行,为抵御量子计算攻击提供了强有力的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools. This process concentrates on deploying “key encapsulation mechanisms” and “signature schemes”, mainly focusing on Group Authenticated key exchange (GAKE), which is crucial for secure group communication while ensuring authentication is immune to quantum attacks. Despite various two-party key exchange designs adaptable for group key exchange protocols with multiple parties, experts face challenges in secure group interactions in a post-quantum environment due to the lack of such group protocols solutions. Addressing the necessity of secure group communication in IoTs, we proposed a GAKE protocol. This paper presents its design and implementation secure under QROM; we compared our initial findings on the “Saber-based GAKE” with a Kyber-based GAKE implementation named “Complied Kyber” proposed by Pablos, focusing on IoTs. Our findings show better efficiency than “Compiled Kyber” regarding overall communication duration, especially when involving up to 2000 participants in group communication. Furthermore, thorough investigation and calculations confirm the Saber-GAKE protocol’s interoperability with IoT contexts. The protocol has worthy computational efficiency, with execution speeds of 0.064 ms on ARM Cortex-M4 and 1.56 ms on ARM Cortex-M0 systems. The memory use is well below the allowed limits, with 50.86 KB on Cortex-M4 and 35.84 KB on Cortex-M0. The performance data validate that the Saber-GAKE protocol can effectively and safely function on IoT devices with limited resources, offering strong protection against quantum computing assaults.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信