Towards post-quantum security for IoT endpoints with NTRU

Oscar M. Guillen, Thomas Poppelmann, Jose M. Bermudo Mera, Elena Fuentes Bongenaar, Georg Sigl, Johanna Sepulveda

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

41 Scopus citations

Abstract

The NTRU cryptosystem is one of the main alternatives for practical implementations of post-quantum, public-key cryptography. In this work, we analyze the feasibility of employing the NTRU encryption scheme, NTRUEncrypt, in resource constrained devices such as those used for Internet-of-Things endpoints. We present an analysis of NTRUEncrypt's advantages over other cryptosystems for use in such devices. We describe four different NTRUEncrypt implementations on an ARM Cortex M0-based microcontroller, compare their results, and show that NTRUEncrypt is suitable for use in battery-operated devices. We present performance and memory footprint figures for different security parameters, as well as energy consumption in a resource constrained microcontroller to backup these claims. Furthermore, to the best of our knowledge, in this work we present the first time-independent implementation of NTRUEncrypt.

Original languageEnglish
Title of host publicationProceedings of the 2017 Design, Automation and Test in Europe, DATE 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages698-703
Number of pages6
ISBN (Electronic)9783981537093
DOIs
StatePublished - 11 May 2017
Event20th Design, Automation and Test in Europe, DATE 2017 - Swisstech, Lausanne, Switzerland
Duration: 27 Mar 201731 Mar 2017

Publication series

NameProceedings of the 2017 Design, Automation and Test in Europe, DATE 2017

Conference

Conference20th Design, Automation and Test in Europe, DATE 2017
Country/TerritorySwitzerland
CitySwisstech, Lausanne
Period27/03/1731/03/17

Keywords

  • Embedded devices
  • IoT
  • NTRUEncrypt
  • Post-quantum
  • Security

Fingerprint

Dive into the research topics of 'Towards post-quantum security for IoT endpoints with NTRU'. Together they form a unique fingerprint.

Cite this