Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
Search Results
Item Analysis of Magnitude of Threats for V2X Authentication Schemes Under Quantum Powered Adversary(Springer Science and Business Media Deutschland GmbH, 2023) Sawant, S.V.; Rudra, B.The Internet has revolutionized the way we communicate. We are now able to connect to anyone across the globe with little or no effort. This revolution has empowered various technological inventions. The Internet has fixed numerous challenges that were difficult to address before. Today, even Vehicular Communication is possible due to the Internet. From providing situational vigilance to taking sound decisions, vehicles have traveled a smart journey. These technological marvels were possible due to the remarkable progress in the computational power of devices. Now, with the world moving towards quantum computing, we stare at future with an ocean of possibilities. Such capabilities in the hands of adversaries can lead to unpleasant consequences. Hence, it is important to determine whether our existing systems are safe against such powerful adversaries. Also, it is equally important to develop techniques that can defend vehicles from adversaries. In this paper, we have listed out various authentication schemes against quantum adversaries and presented our observations. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Unbreakable Security in a Quantum Age: A Systematic Literature Review on Post-Quantum Lattice-Based Standards(Institute of Electrical and Electronics Engineers Inc., 2023) Wahlang, R.; Chandrasekaran, K.The rapid advances in the field of quan-tum computing have led to a concern in the cryp-tographic security implemented in already existing systems. This has led to an increasing interest in the search for post quantum alternatives which are capable of withstanding attacks in the future era of quantum computers. Out of the many approaches that have been put forward, the most promising candidates belong to the class of lattice based cryptography due to their efficient parameter sizes and performances. The robustness of these post quantum schemes have been tested by considering the evaluation criteria which have been put forward by NIST to ensure that the security guarantee provided by these proposed systems are absolute. This paper provides an overview of the various lattice based cryptosystems that have been selected as candidates for standardization by NIST and a comparison between them has been provided demonstrating the differences in their performances on various platforms. © 2023 IEEE.
