Race to Secure IoT: Quantum-Proof Encryption for Embedded Devices

**Quantum-Proof Security for Embedded Devices: A Race Against Time**

In a world increasingly interconnected by billions of Internet of Things (IoT) devices, the looming threat of quantum computers breaking current encryption standards is a pressing concern. Researchers are already working on quantum-attack resilient security schemes, but the challenge lies in making these solutions efficient enough for resource-constrained embedded systems. A recent study published in IEEE Access, titled “Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices,” sheds light on this critical issue.

**The Quantum Threat**

Quantum computers, with their ability to exploit superposition states, can solve complex mathematical problems like integer factorization in polynomial time. This capability directly threatens public key encryption algorithms, which are the backbone of secure communications in emails, banking, digital currencies, defense, and more. “The prospects of a quantum machine that can break such systems are too risky to ignore,” says Basel Halak, lead author of the study and a researcher at the School of Electronics and Computer Science, University of Southampton, U.K.

The concern is not just about the immediate future. Adversaries could be storing encrypted data now to decrypt later, a strategy known as “Store Now, Decrypt Later” (SNLD) attack. Moreover, some systems, particularly in defense and aviation, have operational lifetimes spanning over thirty years, making the threat even more significant.

**Evaluating Quantum-Resistant Algorithms**

Halak and his team developed a testbed to evaluate the energy and computational overheads of quantum-attack resilient security schemes on resource-constrained devices. The testbed emulated a client-server configuration where both devices performed mutual authentication and agreed on a shared key using the TLS protocol. The researchers used a Raspberry Pi 3b+ as a server and a client in the first set of experiments, and a Raspberry Pi Pico W as the client in the second group of tests.

The study found that Kyber1-Dilithium-2 is the most resource-efficient solution, outperforming all other post-quantum cryptography (PQC) algorithms, including the current scheme that uses elliptic curve cryptography. However, the digital signature scheme Sphinx+ was associated with significant latency and energy costs, making it less suitable for IoT-type devices.

**Commercial Impacts for the Energy Sector**

The energy sector, with its critical infrastructure and long operational lifetimes, stands to benefit significantly from these findings. As IoT devices become more prevalent in energy management and grid monitoring, ensuring their security against quantum attacks is paramount. The study’s results can guide the industry in selecting the most efficient and secure encryption algorithms for their embedded systems.

**Shaping Future Developments**

This research underscores the urgency of transitioning to quantum-resistant encryption algorithms. As Halak notes, “The work has already started to develop quantum-attack resilient security schemes.” The study’s findings can inform future developments in the field, helping researchers and industry professionals make informed decisions about the best encryption algorithms for their specific applications.

Published in IEEE Access, the study is a significant step towards ensuring the security of embedded devices in a post-quantum world. As the race against time continues, such research is crucial in shaping the future of cybersecurity.

Scroll to Top
×