SlideShare a Scribd company logo
CITY ENGINEERING COLLEGE
Department of Computer Science and Engineering.
G Siri
1CE13CS027
Under the guidance of
Vivekavardhana Reddy
Asst.,Prof.,- Dept. of CSE.
Bengaluru
Securing the Internet of Things in a
Quantum World
By
CONTENTS
INTRODUCTION
LITERATURE SURVEY
EXISTING SYSTEM
PROPOSED SYSTEM
APPROACHES AND METHOD
RESULT AND DISCUSSION
CONCLUSION
REFERENCES
INTRODUCTION
 Currently, we rely on cryptographic algorithms such as AES and
RSA as basic building blocks to secure the communication in the
IoT.
 However, public key schemes like RSA can easily be broken by
the upcoming quantum computers, due to recent advances in
quantum computing.
 We should act now to prepare the IoT for the quantum world. In
this article, we focus on the current state of the art and recent
developments in the area of quantum-resistant cryptosystems for
securing the IoT
Cryptography
κρυπτόσ (kryptós)
“hidden”
+
γράφω (grápho)
“write”
=
Hidden Writing
QUANTUM WORLD
Heisenberg Uncertainty Principle
• Certain pairs of physical properties of a photon are related in such a
way that measuring one property prevents the observer from knowing
the value of the other.
• When measuring the polarization of a photon, the choice of what
direction to measure affects all subsequent measurements.
• If a photon passes through a vertical filter it will have the vertical
orientation regardless of its initial direction of polarization and so with
horizontal orientation.
Undefined, super imposed
state of existence
Two defined state of existence.
Uncertainty of a Q-Bit
The q-bit collapses into one of the definite state on being measured.
Sl.No AUTHOR TOPIC YEAR ISSUES METHODOLOGY ISSUES TO BE
SOLVED
1. 1)J. Granjal
2)J. Silva
Security for the IoT 2016 Existing security
system survey.
Understanding DH
algorithm, AES and ECC
Study potential
quantum
algorithms.
2. 1) A. Krylovskiy
2) M. Jahn
3) E. Patti
Designing a Smart
City Internet of
Platform with Micro
service Architecture
2015 Building large-scale
Smart City IoT
platforms in practice
remains challenging.
Micro service
architecture.
Aimed at large-
scale distributed
applications
3. 1) Y. K. Kim
2) Y. H. Lee
Automatic
of Social
Relationships
between Internet of
Things in Smart
Home Using SDN-
Based Home Cloud
2015 Management solution
for things, specifically
constrained things
that suffer from
limited computation
and power resources.
IoT-MP expanded as
Internet of Things-
Management platform
User focused
application not
designed.
EXISTING SYSTEM
Available encryption systems can be based on two broad
classification.
1. Symmetric key cryptography
2. Asymmetric key cryptography (Public key)
Symmetric Key
Most Popular Algorithms:
AES-128,192,256
DES (Data Encryption Standards)
Asymmetric Key
Most Popular Algorithms:
RSA (Rivest-Shamir-Adleman)
DSA (Digital Signature Algorithm)
keys to check using brute force.
The Classic Cryptography
 Encryption algorithm and related key are kept secret.
 Breaking the system is hard due to large numbers of possible keys.
 For example: for a key 128 bits long there are
38128
102 
RSAAlgorithm
 The most widely used PKC is the RSA algorithm based on the difficulty of
factoring a product out two large primes.
 Easy Problem Hard Problem
qpn 
Given two large
primes p and q
compute
Given n
compute p and q.
Factoring A Product Of Two Large Primes
 The best known conventional algorithm requires the solution time proportional
to:
 Shor’s algorithm easily solves the large T(n) problem on a Quantum computer,
hence RSA cannot be safe in a Quantum world.
])ln(ln)(lnexp[)( 3/23/1
nncnT 
For p & q 65 digits long T(n) is approximately
one month using cluster of workstations.
For p&q 200 digits long T(n) is astronomical.
Factorizing using Quantum Computing
AES Algorithm
 AES algorithm is the most widely deployed Symmetric key
algorithm.
 It is considered to be most efficient in AES-128 bit encryption
method.
 The best known attack against this algorithm is a Brute-Force
search covering all possible keys.
 Grover’s algorithm speeds up this process in a Quantum
Machine. Therefore, AEC is breakable by a Quantum computer.
PROPOSED SYSTEM
According to NIST (National Institute for Standards and Technology),
widely accepted quantum-resistant public-key cryptosystems include:
Hash-based Signatures.
Code-based cryptosystems.
 The construction of hash-based signatures employs only hash functions, and therefore
minimizes the security requirements for building digital signature schemes.
 The first hash-based signature scheme was proposed by Merkle, who used a binary hash
tree to construct the signatures.
 A common requirement of the hash-based signature schemes is the need to record
information about previously signed messages, which is called “state.” This can lead to
problems when signatures are generated on several devices since these devices have to be
synchronized after each signature generation.
 To avoid this, a stateless hash-based signature scheme called SPHINCS has been proposed,
which can be described as a multi-tree version of XMSS
Hash-based Cryptosystem
 Prof. McEliece proposed the first code-based cryptosystem in 1978.
 It was an error correcting code called the Goppa Code.
 The basic idea of McEliece scheme can be described as follows:
 A message is encrypted into a code word with some added errors.
 Only the private key holder can remove errors and recover the original message.
 There is no quantum attack known that breaks the McEliece cryptosystem.
Code-based Cryptosystem
APPROACHES AND METHODS
 In order to secure AES against the quantum computers, the key
size is expected to be double than the original.
 That is, if the key size is 128-bit, it has to be 256 bit and so on.
 This slows down the Grover’s algorithm, making it safe for AES
to function.
Securing AES
Securing RSA
 For securing asymmetric ciphers, one among the quantum-resistant
cryptosystem has to be used.
 A brief mentioning of candidate algorithm has been mentioned in the
below table.
Purpose Type Candidate algorithm
Public key encryption
(RSA)
Code-based ciphers McEliece with binary
Goppa
Lattice-based ciphers NTRU Encrypt.
RESULTS AND DISCUSSIONS
 There are a number of quantum computing models, distinguished
by the basic elements in which the computation is decomposed.
 Few of the prominent ones would be
 The Superconducting Quantum Machine. (qubit implemented by
the state of small superconducting circuits)
 Electrons-on-helium quantum computers (qubit is the electron
spin)
 Optical lattices (qubit implemented by internal states of neutral atoms
trapped in an optical lattice)
State of the QC Technology.
 Efforts are being made to use Pulsed Laser Beam with low intensity
for firing single photons.
 Detecting and measuring photons is hard.
 The most common method is exploiting Avalanche Photodiodes in
the Geiger mode where single photon triggers a detectable electron
avalanche.
State of the QC technology.
 Key transmissions can be achieved for about 200 km distance.
 For longer distances we can use repeaters. But practical repeaters are a
long way in the future.
 The option of using satellites is also considered, but the distance proves
to be a set-back factor.
WORKING PROTOTYPES
 Quantum cryptography has been tried experimentally over
fibre-optic cables and, more recently, open air (23km).
RIGHT: The first prototype
implementation of quantum
cryptography (IBM, 1989)
CONCLUSION
Recent advances in quantum computing have demonstrated the urgency of
developing quantum-resistant algorithms for securing communication in the
IoT.
The impacts of large-scale quantum computers is evident, on the security of
the cryptographic schemes widely used today.
The biggest stumbling block, for quantum computing, is scalability. Most
demonstrations of progress towards quantum computing use at most a few
qubits. So, the development of quantum computers could take anywhere
between 5 years to a decade.
However, it is important to stay cautious and protect data on the web from
today.
Thank You

More Related Content

What's hot

Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
Damien Magoni
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
M2M Alliance e.V.
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
ShubhamTakkar
 
An introduction to MQTT
An introduction to MQTTAn introduction to MQTT
An introduction to MQTT
Alexandre Moreno
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
Hash function
Hash functionHash function
Hash function
Harry Potter
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemVarun Janga
 

What's hot (20)

Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Firewall
FirewallFirewall
Firewall
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
S/MIME
S/MIMES/MIME
S/MIME
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
An introduction to MQTT
An introduction to MQTTAn introduction to MQTT
An introduction to MQTT
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Hash function
Hash functionHash function
Hash function
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
 

Similar to Technical Seminar on Securing the IoT in the Quantum World

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperManuel Garza
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
IJCNCJournal
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
IJCNCJournal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
MyNOG
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
IJERA Editor
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptx
DineshBoobalan
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
jpstudcorner
 
H42063743
H42063743H42063743
H42063743
IJERA Editor
 

Similar to Technical Seminar on Securing the IoT in the Quantum World (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptx
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
40520130101005
4052013010100540520130101005
40520130101005
 
H42063743
H42063743H42063743
H42063743
 

Recently uploaded

一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Technical Seminar on Securing the IoT in the Quantum World

  • 1. CITY ENGINEERING COLLEGE Department of Computer Science and Engineering. G Siri 1CE13CS027 Under the guidance of Vivekavardhana Reddy Asst.,Prof.,- Dept. of CSE. Bengaluru Securing the Internet of Things in a Quantum World By
  • 2. CONTENTS INTRODUCTION LITERATURE SURVEY EXISTING SYSTEM PROPOSED SYSTEM APPROACHES AND METHOD RESULT AND DISCUSSION CONCLUSION REFERENCES
  • 3. INTRODUCTION  Currently, we rely on cryptographic algorithms such as AES and RSA as basic building blocks to secure the communication in the IoT.  However, public key schemes like RSA can easily be broken by the upcoming quantum computers, due to recent advances in quantum computing.  We should act now to prepare the IoT for the quantum world. In this article, we focus on the current state of the art and recent developments in the area of quantum-resistant cryptosystems for securing the IoT
  • 4.
  • 7. Heisenberg Uncertainty Principle • Certain pairs of physical properties of a photon are related in such a way that measuring one property prevents the observer from knowing the value of the other. • When measuring the polarization of a photon, the choice of what direction to measure affects all subsequent measurements. • If a photon passes through a vertical filter it will have the vertical orientation regardless of its initial direction of polarization and so with horizontal orientation.
  • 8. Undefined, super imposed state of existence Two defined state of existence.
  • 9. Uncertainty of a Q-Bit The q-bit collapses into one of the definite state on being measured.
  • 10. Sl.No AUTHOR TOPIC YEAR ISSUES METHODOLOGY ISSUES TO BE SOLVED 1. 1)J. Granjal 2)J. Silva Security for the IoT 2016 Existing security system survey. Understanding DH algorithm, AES and ECC Study potential quantum algorithms. 2. 1) A. Krylovskiy 2) M. Jahn 3) E. Patti Designing a Smart City Internet of Platform with Micro service Architecture 2015 Building large-scale Smart City IoT platforms in practice remains challenging. Micro service architecture. Aimed at large- scale distributed applications 3. 1) Y. K. Kim 2) Y. H. Lee Automatic of Social Relationships between Internet of Things in Smart Home Using SDN- Based Home Cloud 2015 Management solution for things, specifically constrained things that suffer from limited computation and power resources. IoT-MP expanded as Internet of Things- Management platform User focused application not designed.
  • 11. EXISTING SYSTEM Available encryption systems can be based on two broad classification. 1. Symmetric key cryptography 2. Asymmetric key cryptography (Public key)
  • 12. Symmetric Key Most Popular Algorithms: AES-128,192,256 DES (Data Encryption Standards) Asymmetric Key Most Popular Algorithms: RSA (Rivest-Shamir-Adleman) DSA (Digital Signature Algorithm)
  • 13. keys to check using brute force. The Classic Cryptography  Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there are 38128 102 
  • 14. RSAAlgorithm  The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product out two large primes.  Easy Problem Hard Problem qpn  Given two large primes p and q compute Given n compute p and q.
  • 15.
  • 16.
  • 17. Factoring A Product Of Two Large Primes  The best known conventional algorithm requires the solution time proportional to:  Shor’s algorithm easily solves the large T(n) problem on a Quantum computer, hence RSA cannot be safe in a Quantum world. ])ln(ln)(lnexp[)( 3/23/1 nncnT  For p & q 65 digits long T(n) is approximately one month using cluster of workstations. For p&q 200 digits long T(n) is astronomical.
  • 19. AES Algorithm  AES algorithm is the most widely deployed Symmetric key algorithm.  It is considered to be most efficient in AES-128 bit encryption method.  The best known attack against this algorithm is a Brute-Force search covering all possible keys.  Grover’s algorithm speeds up this process in a Quantum Machine. Therefore, AEC is breakable by a Quantum computer.
  • 20. PROPOSED SYSTEM According to NIST (National Institute for Standards and Technology), widely accepted quantum-resistant public-key cryptosystems include: Hash-based Signatures. Code-based cryptosystems.
  • 21.  The construction of hash-based signatures employs only hash functions, and therefore minimizes the security requirements for building digital signature schemes.  The first hash-based signature scheme was proposed by Merkle, who used a binary hash tree to construct the signatures.  A common requirement of the hash-based signature schemes is the need to record information about previously signed messages, which is called “state.” This can lead to problems when signatures are generated on several devices since these devices have to be synchronized after each signature generation.  To avoid this, a stateless hash-based signature scheme called SPHINCS has been proposed, which can be described as a multi-tree version of XMSS Hash-based Cryptosystem
  • 22.  Prof. McEliece proposed the first code-based cryptosystem in 1978.  It was an error correcting code called the Goppa Code.  The basic idea of McEliece scheme can be described as follows:  A message is encrypted into a code word with some added errors.  Only the private key holder can remove errors and recover the original message.  There is no quantum attack known that breaks the McEliece cryptosystem. Code-based Cryptosystem
  • 23. APPROACHES AND METHODS  In order to secure AES against the quantum computers, the key size is expected to be double than the original.  That is, if the key size is 128-bit, it has to be 256 bit and so on.  This slows down the Grover’s algorithm, making it safe for AES to function. Securing AES
  • 24. Securing RSA  For securing asymmetric ciphers, one among the quantum-resistant cryptosystem has to be used.  A brief mentioning of candidate algorithm has been mentioned in the below table. Purpose Type Candidate algorithm Public key encryption (RSA) Code-based ciphers McEliece with binary Goppa Lattice-based ciphers NTRU Encrypt.
  • 25. RESULTS AND DISCUSSIONS  There are a number of quantum computing models, distinguished by the basic elements in which the computation is decomposed.  Few of the prominent ones would be  The Superconducting Quantum Machine. (qubit implemented by the state of small superconducting circuits)  Electrons-on-helium quantum computers (qubit is the electron spin)  Optical lattices (qubit implemented by internal states of neutral atoms trapped in an optical lattice)
  • 26. State of the QC Technology.  Efforts are being made to use Pulsed Laser Beam with low intensity for firing single photons.  Detecting and measuring photons is hard.  The most common method is exploiting Avalanche Photodiodes in the Geiger mode where single photon triggers a detectable electron avalanche.
  • 27. State of the QC technology.  Key transmissions can be achieved for about 200 km distance.  For longer distances we can use repeaters. But practical repeaters are a long way in the future.  The option of using satellites is also considered, but the distance proves to be a set-back factor.
  • 28. WORKING PROTOTYPES  Quantum cryptography has been tried experimentally over fibre-optic cables and, more recently, open air (23km). RIGHT: The first prototype implementation of quantum cryptography (IBM, 1989)
  • 29. CONCLUSION Recent advances in quantum computing have demonstrated the urgency of developing quantum-resistant algorithms for securing communication in the IoT. The impacts of large-scale quantum computers is evident, on the security of the cryptographic schemes widely used today. The biggest stumbling block, for quantum computing, is scalability. Most demonstrations of progress towards quantum computing use at most a few qubits. So, the development of quantum computers could take anywhere between 5 years to a decade. However, it is important to stay cautious and protect data on the web from today.