Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
A vast majority of public key algorithms available in literature, such as Diffie–Hellman algorithm, RSA algorithm, and ECDH, are easily broken by the quantum computer and are insecure. The Ring Learning With Errors (RLWE) key exchange (Ding et al., 2012) is one of the post-quantum public-key exchange algorithms that are designed to provide security against quantum computers. RLWE is a lattice-based cryptographic algorithm, and it is a widespread notion that lattice-based cryptographic algorithms provide security against quantum attacks and provide forward secrecy like Diffie–Hellman algorithm and ECDH.
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Abdallah et al. have proposed an efficient networking and security architecture for disaster surveillance through a UAV system. Communication in the UAV system happens through the IEEE 802.11ah standard. The proposed architecture uses lightweight Ring Learning With Errors (Ring-LWE) cryptosystem to ensure the confidentiality of exchanged messages with low computation overhead. The system model of the proposed architecture consists of a TA, a central substation, relay nodes (not used for monitoring), and groups of UAVs for disaster surveillance of different sub-areas of the complete disaster area. The proposed architecture ensures the integrity of readings transmitted during monitoring operation, integrity of exchanged messages during join/leave process, and the integrity of message readings even in presence of compromised monitoring drones/cluster head drones. The proposed architecture provides information availability even when a whole group of drones is compromised. The proposed architecture makes sure that only the control station receives the desired plaintext readings messages, CS receives accurate readings even in presence of some compromised drones, and that the adversaries can neither extract the plaintext nor falsify them. Ring-LWE is resistant to post-quantum attacks. Performance analysis shows that for a particular number of drones in a group, the computation overhead per group using Ring-LWE is extremely low when compared to that with RSA cryptosystem. Performance analysis also shows that the cluster head of a group consumes more energy than that by any other ordinary drone just used for scanning an area and collecting data, but the difference is low because of the low communication and computation complexity of the proposed architecture (Abdallah etal., 2019).
A Comparative Review on Homomorphic Encryption for Cloud Security
Published in IETE Journal of Research, 2021
Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty
This scheme uses functions based on integers. It doesn’t require many operations, thereby saving time and preventing complexity. Gentry’s FHE scheme-based on Learning With Errors (LWE) or Ring Learning With Errors (RLWE).