Browse > Article
http://dx.doi.org/10.3745/KTCCS.2020.9.8.165

Design of a Lightweight Security Protocol Using Post Quantum Cryptography  

Jang, Kyung Bae (한성대학교 IT융합공학부)
Sim, Min Joo (한성대학교 IT융합공학부)
Seo, Hwa Jeong (한성대학교 IT융합공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.9, no.8, 2020 , pp. 165-170 More about this Journal
Abstract
As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.
Keywords
IoT; Information Protection; Lightweight Security Protocol; RSA; ECC; Quantum Computer; NIST Post Quantum Cryptography Standardization; Code-Based Cryptography; ROLLO;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Gen. Comput. Syst, Vol. 29, No. 7, pp. 1645-1660, 2013.   DOI
2 K. H. Wang, C. M. Chen, W. Fang and T. Y. Wu, "A Secure Authentication Scheme for Internet of Things," Pervasive and Mobile Computing, Vol. 42, pp. 15-26, 2017.   DOI
3 R. J. McEliece, "A Public-Key Cryptosystem Based On Algebraic Coding Theory," Technical Report, NASA, 1978.
4 C. A. Melchor, N. Aragon, M. Bardet, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, A. Hauteville, A. Otmani, O. Ruatta, J. P. Tillich, and G. Zemor, "ROLLO-Rank-Ouroboros, LAKE& LOCKER," Submission to the NIST Post Quantum Standardization Process, Round 2, 2019.
5 K. S. Roy and H. K. Kalita, “A Code based Light-weight Authentication Scheme for IoT in Fog Computing Environment,” Jour of Adv Research in Dynamical & Control Systems, Vol. 11, No. 6, pp. 97-107, 2019.
6 Github: source code [internet], https://github.com/starj1023/Code-Based-Protocol-ROLLO-
7 A. Armando, D. Basin, Y. Boichut,Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P. C. Heam, O. Kouchnarenko, J. Mantovani, S. Modersheim, D. V. Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano, and L. Vigneron, "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications," in Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), Vol. 3576, pp. 281-285, 2005.