TY - JOUR
T1 - Securing the Internet of Things in a Quantum World
AU - Cheng, Chi
AU - Lu, Rongxing
AU - Petzoldt, Albrecht
AU - Takagi, Tsuyoshi
N1 - Funding Information:
The work presented in this article was supported in part by the National Natural Science Foundation of China under Grant nos. 61301166, 61672029, 61363069, and 61662016
PY - 2017/2
Y1 - 2017/2
N2 - Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs) as basic building blocks to secure the communication in the IoT. However, public key schemes like ECC can easily be broken by the upcoming quantum computers. Due to recent advances in quantum computing, we should act now to prepare the IoT for the quantum world. In this article, we focus on the current state of the art and recent developments in the area of quantum-resistant cryptosystems for securing the IoT. We first demonstrate the impacts of quantum computers on the security of the cryptographic schemes used today, and then give an overview of the recommendations for cryptographic schemes that can be secure under the attacks of both classical and quantum computers. After that, we present the existing implementations of quantum-resistant cryptographic schemes on constrained devices suitable for the IoT. Finally, we give an introduction to ongoing projects for quantum-resistant schemes that will help develop future security solutions for the IoT.
AB - Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs) as basic building blocks to secure the communication in the IoT. However, public key schemes like ECC can easily be broken by the upcoming quantum computers. Due to recent advances in quantum computing, we should act now to prepare the IoT for the quantum world. In this article, we focus on the current state of the art and recent developments in the area of quantum-resistant cryptosystems for securing the IoT. We first demonstrate the impacts of quantum computers on the security of the cryptographic schemes used today, and then give an overview of the recommendations for cryptographic schemes that can be secure under the attacks of both classical and quantum computers. After that, we present the existing implementations of quantum-resistant cryptographic schemes on constrained devices suitable for the IoT. Finally, we give an introduction to ongoing projects for quantum-resistant schemes that will help develop future security solutions for the IoT.
UR - http://www.scopus.com/inward/record.url?scp=85012994931&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85012994931&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2017.1600522CM
DO - 10.1109/MCOM.2017.1600522CM
M3 - Article
AN - SCOPUS:85012994931
VL - 55
SP - 116
EP - 120
JO - IEEE Communications Society Magazine
JF - IEEE Communications Society Magazine
SN - 0163-6804
IS - 2
M1 - 7842421
ER -