A Power-Efficient and Quantum-Resistant N-Bit Cryptography Algorithm

A Power-Efficient and Quantum-Resistant N-Bit Cryptography Algorithm

Rohini S. Hongal, Rajashekar B. Shettar
Copyright: © 2020 |Pages: 16
DOI: 10.4018/IJNCR.2020100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With rapid technological advancements and enhanced network growth, security contends to play a crucial role. A powerful network security tends to point out diverse mixture of threats and intimidations and blocks them from creeping and getting circulated into the network to preserve the reliability, confidentiality, integrity, and accessibility of computer networks by annihilating illegitimate admittance and corruption of critical information. Secure hash algorithms (SHA) are cryptographic hash functions used to produce a hash value of fixed output bit sizes. In this paper, an algorithm is proposed to strengthen the cryptographic systems by using reversible logic to generate higher and variable hash values, making it difficult to trace the keys. The proposed scheme is simulated and verified using FPGA Virtex ML505 board, the analysis of power and time of which is carried out using Genus tool, proving it to be efficient in terms of power, gate usage, garbage, and quantum cost.
Article Preview
Top

Introduction

Technological advancements, network development, rise of decentralized network, edge computing given rise to fresh possibilities and have fuelled the demand for digitization. Analysing applications of wireless networks involved in collection and transfer of data. The data over networking could be as important as being in the wrong hands would change millions of people’s life in a second. Data security has been evolved as one of the major and active area of interest for researchers. Cryptography is a way of securing the data by transforming it into an obscured form. Hash functions are the form of cryptographic algorithms that produce a string of fixed length for the data provided. Hence used in applications where there is a significant need to verify the identity of the other party rather than the original data encryption. This technique has grown over the time with pros and cons and has taken a new dimension in digital signatures. Advancements in classical computing and quantum computing techniques have driven the need for more stronger cryptography.

Having put a constant effort, the National Institute of Standard and Technology (NIST) has provided recommendations for change in the sizes from 80 bits to 128 bits security. Quantum computers are involved in altering the messages by adapting several communication techniques along with the associated mathematical concepts. Research is being carried out for the analysis of scalability of the quantum computers and by the analysis, it is estimated that the capacity of quantum computer will be enhanced to break a 2000 bit Rivert-Shavor Adleman (RSA) cryptosystem by 2030 (Lily Chen et al., 2016). In a view of securing sensitive computerized message or data, many cryptographic algorithms are being formulated by computer scientist and mathematicians arriving to present the information from malicious attacks. These developments have created a threat of making many of the present NIST recommended techniques obsolete. This is also because the counter attacking programs are getting advanced at the faster rate. Therefore, there is a necessity of correlating and analysing the forecasts and predictions by crumbling these cryptosystems with scholastic computers. The cryptosystems that were formulated in 2011-2013 aiming to offer 80bits security are judged to be broken at a cost of approximately hundred million dollars and are therefore at greater risks. Study says that cryptosystems developed to offer 112bits security may exist for some period of time and can be broken at a cost of billions of dollars in a duration of 30 to 40 years (Lily Chen et al., 2016; Matthew Campagna et al., 2015).

The quantum computers can efficiently compute the hard mathematical problems faster. Table 1 depicts a brief analysis of conventional cryptography algorithms and effect of quantum computers on them.

This paper has chosen SHA algorithms to study the impact of quantum computers and attempt is made to design an approach to increase the output length of hash functions and implemented design using reversible logic to make it power efficient (Lily Chen et al., 2016).

Table 1.
Quantum computing and its impact on cryptographic algorithms (Lily Chen et al., 2016)
Cryptographic AlgorithmTypePurposeImpact from large-scale quantum computer
AESSymmetric keyEncryptionLarger key sizes needed
SHA-2, SHA-3HashingHash functionsLarger Output needed
RSAPublic keySignature, key establishmentNo longer secure
ECDSA, ECDH (Elliptic Curve Cryptography)Public keySignatures, key exchangeNo longer secure
DS(Finite Field Cryptography)Public keySignatures, key exchangeNo longer secure

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 11: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 10: 4 Issues (2021)
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 2 Issues (2017)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing