Skip to Content
IoT Security
book

IoT Security

by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila
February 2020
Intermediate to advanced
320 pages
11h 11m
English
Wiley
Content preview from IoT Security

5Lattice‐Based Cryptography and Internet of Things

Veronika Kuchta and Gaurav Sharma

5.1 Introduction

Post‐quantum cryptography is an essential research topic which became more popular since the start of research on quantum computing. Quantum computers are highly powerful machines which take advantage of subatomic particles which exist in more than one state at any time. Such machines are able to process information in an incomparably faster time than the fastest computers. IBM and Google are the leading companies in this race for the first quantum computer that will then be made publicly available and extremely useful. The main feature of such a powerful computer is that it will be able to perform calculations which are almost impossible to be simulated by a conventional computer. A computer with this feature will ewasily be able to break all of the current cryptographic constructions which have proven to be secure under number‐theoretical assumptions. A possible solution to this problem can be offered by the following research fields which are assumed to be resistant against quantum attacks:

  1. Hash‐based Cryptography. A typical example for this field is given by the Merkle's hash‐tree public‐key signature scheme, which was introduced in 1979. While on the one side hash‐based cryptographic schemes offer an efficient solution to certain cryptographic problems, the main disadvantage of those schemes is the large size of signatures.
  2. Code‐based Cryptography. McEliece's hidden Goppa‐code ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security

Practical Internet of Things Security

Brian Russell, Drew Van Duren
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781119527923Purchase book