loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Jon Barton ; William J. Buchanan ; Nikolaos Pitropakis ; Sarwar Sayeed and Will Abramson

Affiliation: Blockpass ID Lab, School of Computing, Edinburgh Napier University, Edinburgh, U.K.

Keyword(s): Post Quantum Cryptography, Cryptography, IoT, R-PI.

Abstract: Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method. For a cryptographic system to remain secure against a quantum adversary, we need to build methods based on a hard mathematical problem, which are not susceptible to Shor’s algorithm and create Post Quantum Cryptography (PQC). While high-powered computing devices may be able to run these new methods, we need to investigate how well these methods run on limited powered devices. This paper outlines an evaluation framework for PQC within constrained devices, and contributes to the area by providing benchmarks of the front-running algorithms on a popular single-board low-power device. It also introduces a set of five notions which can be considered to determine the robustness o f particular algorithms. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 13.58.121.131

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Barton, J.; Buchanan, W.; Pitropakis, N.; Sayeed, S. and Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 551-561. DOI: 10.5220/0010903000003120

@conference{icissp22,
author={Jon Barton. and William J. Buchanan. and Nikolaos Pitropakis. and Sarwar Sayeed. and Will Abramson.},
title={Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP},
year={2022},
pages={551-561},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010903000003120},
isbn={978-989-758-553-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP
TI - Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
SN - 978-989-758-553-1
IS - 2184-4356
AU - Barton, J.
AU - Buchanan, W.
AU - Pitropakis, N.
AU - Sayeed, S.
AU - Abramson, W.
PY - 2022
SP - 551
EP - 561
DO - 10.5220/0010903000003120
PB - SciTePress