The deployment of 5G technology marks a significant milestone in wireless communication, offering unparalleled speed, low latency, and the capacity to connect billions of devices through the Internet of Things (IoT). ...
详细信息
The deployment of 5G technology marks a significant milestone in wireless communication, offering unparalleled speed, low latency, and the capacity to connect billions of devices through the Internet of Things (IoT). However, these advancements introduce considerable security challenges due to the increased complexity and scale of 5G networks, as well as the growing threat landscape. This paper introduces a novel security framework for 5G networks, addressing these challenges with innovative cryptographic and authentication solutions. By integrating elliptic curve cryptography (ECC) with quantum-resistant algorithms, the framework ensures secure key management that is future-proof against emerging threats, including those posed by quantum computing. Furthermore, the hybrid multifactor authentication system, encompassing biometric verification, one-time passwords (OTPs), and mutual authentication, provides a robust defense mechanism against unauthorized access and identity spoofing. Simulation results using NS3 demonstrate the model's superior performance, achieving 99.5% accuracy and low latency of 200 ms, surpassing traditional methods in both security and efficiency. The framework is further designed to withstand common cyberattacks, including man-in-the-middle and replay attacks, ensuring robust protection for critical applications like IoT ecosystems, autonomous vehicles, and smart cities. This comprehensive approach not only enhances data protection and network security but also ensures scalability, adaptability, and energy efficiency, positioning the framework as a critical solution for next-generation communication systems and beyond.
The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature...
详细信息
The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically assess the development, methodologies, and security of post-quantum hash-based signature schemes as resilient alternatives. Through a methodical selection process from leading academic databases, we identify and analyze key contributions to the field within the last decade, focusing on the schemes' security proofs, enhanced performance, and efficiency metrics. Our analysis reveals a diverse landscape of hash-based signature schemes, their evolving security features against quantum threats, and their practical implementations in securing digital communications. The review highlights the importance of advancing these quantum-resistant technologies, discusses the challenges in their adoption, and outlines future directions for research and standardization efforts. The findings aim to provide a comprehensive resource for researchers, practitioners, and policymakers involved in the transition toward secure cryptographic practices in the quantum era.
quantum computing is one of the shifts in paradigm with the potential to break most cryptographic systems. quantum computers will run complex problems with superposition and entanglement much faster exponentially than...
详细信息
ISBN:
(纸本)9798331517519;9798331517526
quantum computing is one of the shifts in paradigm with the potential to break most cryptographic systems. quantum computers will run complex problems with superposition and entanglement much faster exponentially than classical computers. This poses a solid threat to cryptographic security by efficiently factoring large integers using quantumalgorithms like Shor's algorithm, possibly breaking public-key cryptosystems like RSA and ECC. Moreover, Grover's algorithm speeds up symmetric key algorithms brute-force search. This paper discusses these vulnerabilities, surveys the development and feasibility of quantum-resistant algorithms, and addresses practical challenges from their implementations. Finally, it points out standardization processes underway and computation paths for further research. Our findings underline the need to urgently migrate to quantumresistant cryptographic solutions for robust security in the presence of quantum computing.
The internet of things (IoT)-based energy internet (EI) is an emerging technology that enables innovative and distributed energy networks. However, as merging technologies often create complex structures, securing IoT...
详细信息
The internet of things (IoT)-based energy internet (EI) is an emerging technology that enables innovative and distributed energy networks. However, as merging technologies often create complex structures, securing IoT-based EI against cyber-attacks becomes challenging. While existing solutions can protect this environment against well-known attacks, only a few works have addressed the issue of quantum attacks. To address this issue, this paper proposes a mechanism to defend against quantum computer attacks in IoT-based EI using the Goldreich-Goldwasser-Halev (GGH) cryptosystem and quantum key distribution. These techniques offer the best security features and contribute to secure authentication, eavesdropping detection, and resistance to the most well-known attacks. Our scheme's evaluation using the AVISPA tool demonstrates its lightweight nature with regard to the security properties it guarantees. Our contribution is crucial for ensuring secure IoT-based EI, as it protects against quantum computer attacks.
quantum computing utilizes properties of quantum physics to build a fast-computing machine that can perform quantum computations. This will eventually lead to faster and more efficient calculations especially when we ...
详细信息
quantum computing utilizes properties of quantum physics to build a fast-computing machine that can perform quantum computations. This will eventually lead to faster and more efficient calculations especially when we deal with complex problems. However, there is a downside related to this hardware revolution since the security of widely used cryptographic schemes, e.g., RSA encryption scheme, relies on the hardness of certain mathematical problems that are known to be solved efficiently by quantum computers, i.e., making these protocols insecure. As such, while quantum computers most likely will not be available any time in the near future, it's necessary to create alternative solutions before quantum computers become a reality. This paper therefore provides a comprehensive review of attacks and countermeasures in Post-quantum Cryptography (PQC) to portray a roadmap of PQC standardization, currently led by National Institute of Standards and Technology (NIST). More specifically, there has been a rise in the side-channel attacks against PQC schemes while the NIST standardization process is moving forward. We therefore focus on the side-channel attacks and countermeasures in major post-quantum cryptographic schemes, i.e., the final NIST candidates.(c) 2023 Elsevier Inc. All rights reserved.
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected stand...
详细信息
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. This paper provides a comparative evaluation of these algorithms across key metrics. The results indicate varying strengths and weaknesses for each algorithm, underscoring the importance of context-specific deployments. Our findings indicate that Dilithium offers advantages in low-power scenarios, Falcon excels in signature verification speed, and Sphincs+ provides robust security at the cost of computational efficiency. These results underscore the importance of context-specific deployments in specific and resource-constrained technological applications, like IoT, smart cards, blockchain, and vehicle-to-vehicle communication.
暂无评论