Smart City Gnosys

Smart city article details

Title Lightweight And Dpa-Resistant Post-Quantum Cryptoprocessor Based On Binary Ring-Lwe
ID_Doc 35232
Authors Ebrahimi S.; Bayat-Sarmadi S.
Year 2020
Published Proceedings - 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020
DOI http://dx.doi.org/10.1109/CADS50570.2020.9211858
Abstract With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade, some of the variants of Ring-LWE cryptosystem have been implemented efficiently on both hardware and software and are shown to be practical on different resource-constrained and embedded devices in IoT. Besides efficiency, every practical implementation of any cryptosystem must also be analyzed against side-channel attacks. In this paper, we propose masking countermeasure against differential power analysis (DPA) attack on lightweight implementations of binary Ring-LWE on hardware. Our experimental results indicate that proposed DPA-secure implementations have lower than 14% performance overhead and are still practical on resource-constrained devices. Moreover, the FPGA implementation results indicate more than 99% and 81% improvement for speed and efficiency, respectively compared to previous work. © 2020 IEEE.
Author Keywords hardware implementation; internet of things (IoT); lattice-based cryptography; Post-quantum cryptography; ring learning with errors (Ring-LWE)


Similar Articles


Id Similarity Authors Title Published
803 View0.877Satrya G.B.; Agus Y.M.; Mnaouer A.B.A Comparative Study Of Post-Quantum Cryptographic Algorithm Implementations For Secure And Efficient Energy Systems MonitoringElectronics (Switzerland), 12, 18 (2023)
7854 View0.862Agus Y.M.; Murti M.A.; Kurniawan F.; Cahyani N.D.W.; Satrya G.B.An Efficient Implementation Of Ntru Encryption In Post-Quantum Internet Of ThingsProceedings of the 2020 27th International Conference on Telecommunications, ICT 2020 (2020)
4323 View0.859Chawla D.; Mehra P.S.A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And SolutionsInternet of Things (Netherlands), 24 (2023)
47756 View0.853Khan M.A.; Khan M.A.Securing Iot In The Post-Quantum Era: Implementation, Challenges And Future DirectionsIEEE Communications Standards Magazine (2025)
42432 View0.852Obaid A.H.; Al-Husseini K.A.O.; Al-Shareeda M.A.; Almaiah M.A.; Shehab R.Post-Quantum Secure Anonymous Authentication For Smart CitiesInternational Journal of Innovative Research and Scientific Studies, 8, 3 (2025)
29755 View0.851Mathews R.; Jose D.V.Hybrid Homomorphic-Asymmetric Lightweight Cryptosystem For Securing Smart Devices: A ReviewTransactions on Emerging Telecommunications Technologies, 35, 1 (2024)