(UPI) Chapter 16: Emerging Technologies in Cybersecurity
53-minute College Credit Course
Start Course- College Credit
- Beginner
About this Course
In this chapter, emerging post-quantum cryptographic (PQC) technologies are explored with a focus on lattice and code-based schemes, detailing how Physical Unclonable Functions (PUFs) can be integrated to generate secure public–private key pairs for future PKIs. Experimental evaluations demonstrate that, with proper optimization (e.g., using AVX2 and GPU acceleration), PQC protocols like CRYSTALS-Dilithium and LightSABER can achieve performance competitive with current ECC-based systems, paving the way for secure key distribution in the quantum era.
16.2. Lattice and Code-Based Post Quantum Cryptography
In this stage, the chapter introduces the foundational PQC schemes based on lattice problems and code-based approaches, explaining key generation methods like Learning with Error (LWE), Learning with Rounding (LWR), and NTRU cryptography.
5 steps16.3. Public Key Infrastructure
In this stage, the integration of PQC algorithms into a traditional Public Key Infrastructure is discussed, emphasizing the secure generation, distribution, and verification of key pairs using advanced cryptographic techniques and hardware acceleration.
4 steps16.4. PUF-Based Key Distribution for PQC
In this stage, protocols leveraging Physical Unclonable Functions (PUFs) are presented to generate one-time-use key pairs for various PQC algorithms, ensuring enhanced security by mitigating storage risks and addressing error rates with error-correcting techniques.
6 steps-
16.4.1 PUF-Based Key Distribution for LWE Lattice Cryptography
-
16.4.2 PKI Architecture with PUF-Based Key Distribution and LWE
-
16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography
-
16.4.4 PUF-Based Key Distribution for NTRU Lattice Cryptography
-
16.4.5 PUF-Based Key Distribution for Code-Based Cryptography
-
Quiz 16.4
5 questions
16.5. Experimental Evaluation
In this stage, the chapter details the experimental setup and results, comparing key generation throughput across different PQC algorithms using a response-based cryptography (RBC) engine and benchmarking them against established standards like ECC and AES.
4 steps