Explore chapters and articles related to this topic
Cyber Physical Systems Threat Landscape
Published in G.R. Karpagam, B. Vinoth Kumar, J. Uma Maheswari, Xiao-Zhi Gao, Smart Cyber Physical Systems, 2020
With Industry 4.0 gaining a lot of attention and momentum, CPS will become mainstream, with multiple deployments expected in the coming years. At the same time, there are lots of new technology trends that can have an impact on the security of CPS systems. Quantum computing advances can impact the security of IT and OT systems and, if the developments stay at the same pace, many existing encryption algorithms will become easily compromised, leading to potential compromise of the security of Cyber Physical Systems. With this trend in mind, it is advisable for modern Cyber Physical Systems to be designed with cryptographic agility, allowing the configuration of cryptographic cipher key size (e.g., key size of 3072 and above for RSA algorithms) and cipher algorithms to handle the advances in quantum computing without major changes to the product. It is highly recommended that important data at rest is protected by strong encryption algorithms and strong key sizes. Please see references for more information on quantum computing and impact on security.
Post-Quantum Cryptography
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Amandeep Singh Bhatia, Ajay Kumar
Post-quantum cryptography offers secure alternatives, which consists many cryptographic systems that can be used for today’s Internet communication. During the last decade, we have seen dynamic and secure developments in theory and its applications producing original ideas and algorithms. But there is a need of new hardware for their execution, which can be expensive of a large number of users. There is need of more effort to enhance the understanding and morale to use post-quantum cryptography widely. It is clear that in order to shift to the era of post-quantum cryptography, there are many interesting challenges and important questions that need to be resolved yet. Particularly, there is a need to shorten the public-key size and to improve the efficiency and execution of quantum safe algorithms in the current systems. At present, there are lots of things happening in the field of post-quantum cryptography. Thus, as the new enhancements and algorithms are introduced, they need to be investigated as well.
Lightweight Cryptography in 5G Machine-Type Communication
Published in Mahmoud Elkhodr, Qusay F. Hassan, Seyed Shahrestani, Networks of the Future, 2017
Hüsnü Yıldız, Adnan Kılıç, Ertan Onur
After the standardized DES was broken due to a small key size (56-bit keys), designers attempted to increase the security concept by encrypting the data several times using multiple keys. It can be considered that a brute-force attack would require 2kxn operations, where k is the key size and n is the number of encryption procedures.
Development and design of an FPGA-based encoder for NPN
Published in Cogent Engineering, 2022
M.K. Ibraimov, S.T. Tynymbayev, A.A. Skabylov, Y. Kozhagulov, D.M. Zhexebay
Figure 6(a,b) show timing and used hardware resource when encrypting data of various sizes. The use of equipment resources increases as length of the encryption block increases, except for used memory, since the calculation is performed iteratively for the n-bit. A larger key size increases the number of conversion cycles for the designed encryption and decryption chip, which increases the combinational path delay, minimum and maximum timing pulse synchronization. The performance of the microcircuit is estimated based on the maximum frequency supported by the FPGA hardware.
Energy Efficient Lightweight Cryptography Algorithms for IoT Devices
Published in IETE Journal of Research, 2022
Tarun Kumar Goyal, Vineet Sahula, Deepak Kumawat
Security of a cryptography algorithm depends on key size. It is measured in terms of time and data complexity. Processes to find time and data complexity differ from algorithm to algorithm. Cryptanalysis for block ciphers (i.e. AES and PRESENT) has been done with the help of biclique cryptanalysis. Cryptanalysis for stream cipher (i.e. ECC) has been done with the help of Pollard's rho and baby step-giant step. AES, PRESENT, RSA, and ECDH are robust and complex. It is shown in Figure 1, complexity in AES and ECDH algorithms are exponential () and sub-exponential (), respectively, while for RSA is defined by n, where n is shown in Equation (1) and L is the number of bits. The rest of the paper is organized as follows. In Section 2, we discuss related work on lightweight security schemes, e.g. symmetric public key crypto-algorithms like PRESENT, AES and asymmetric public key crypto-algorithms like ECDH, RSA. In Section 3, we analyse robustness, i.e. difficulty in breaking the security scheme, for various security algorithms using biclique cryptanalysis and Pollard's rho. Section 4 provides brief idea about hardware implementation methodology of ECDH and PRESENT. In this section, we describe architectures (iterative and parallel) for PRESENT and efficient modulus calculation of a fractional number used in ECDH. In Section 5, we provide results of implementation of PRESENT with optimized S-Box and efficient ECDH with improved modulus method. In this section, we also identify the desired security solution, which possesses a low footprint (lightweight, low power, and high throughput) with adequate security. This energy efficient solution is quite useful for IoT devices.