TY - JOUR
T1 - RLizard
T2 - Post-Quantum Key Encapsulation Mechanism for IoT Devices
AU - Lee, Joohee
AU - Kim, Duhyeong
AU - Lee, Hyungkyu
AU - Lee, Younho
AU - Cheon, Jung Hee
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2019
Y1 - 2019
N2 - We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems. Because RLizard operates on a special type of ring, it is more efficient in terms of both the clock cycles required for key generation and the key size compared with the original Lizard scheme. To demonstrate the superiority of the proposed method over other well-known KEMs, we compared their performances in the 32-bit ARM Internet of Things (IoT) environment. The performance analysis showed that the RLizard KEM requires the fewest clock cycles for key generation, encapsulation, and decapsulation when the parameters are set to support a security level comparable with that of AES-128. In summary, the RLizard KEM is expected to be used for secure communication and authentication between IoT endpoint devices, whose computational power is generally limited.
AB - We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems. Because RLizard operates on a special type of ring, it is more efficient in terms of both the clock cycles required for key generation and the key size compared with the original Lizard scheme. To demonstrate the superiority of the proposed method over other well-known KEMs, we compared their performances in the 32-bit ARM Internet of Things (IoT) environment. The performance analysis showed that the RLizard KEM requires the fewest clock cycles for key generation, encapsulation, and decapsulation when the parameters are set to support a security level comparable with that of AES-128. In summary, the RLizard KEM is expected to be used for secure communication and authentication between IoT endpoint devices, whose computational power is generally limited.
KW - Internet of Things
KW - Key encapsulation mechanism
KW - post-quantum cryptography
KW - security
UR - https://www.scopus.com/pages/publications/85057855170
U2 - 10.1109/ACCESS.2018.2884084
DO - 10.1109/ACCESS.2018.2884084
M3 - Article
AN - SCOPUS:85057855170
SN - 2169-3536
VL - 7
SP - 2080
EP - 2091
JO - IEEE Access
JF - IEEE Access
M1 - 8555993
ER -