TY - CHAP
T1 - Information-Theoretic Cryptography
T2 - A Maneuver in the Trade-Off Space of Cryptography in IoT
AU - Zolfaghari, Behrouz
AU - Bibak, Khodakhast
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - This chapter discusses the reason why we have chosen to study perfectly secure cryptography (as a branch of information-theoretic cryptography) among the existing approaches to cryptography in IoT. To this end, we take a systematic approach. We first introduce timeliness and resource constraint awareness as two critical requirements of cryptography in IoT and highlight the trade-off between them. Next, we use the existing research literature to establish an ecosystem as well as a life cycle for each of the following fields. Real-time cryptographyResource-constrained cryptography (including embedded and lightweight cryptography)Cryptography in IoTReal-time cryptographyResource-constrained (embedded and lightweight) cryptography in IoT In the next step, we demonstrate that all the developed ecosystems and life cycles are closely similar to each other. The ecosystems consist of similar enablers and application areas. Further, the life cycles include similar phases with similar challenges and issues in each phase. These findings lead to the formation of common ecosystems and life cycles for all of the aforementioned fields. Finally, we establish an ecosystem as well as a life cycle for information-theoretic cryptography and highlight their similarities to the common ecosystem and the common life cycle mentioned above. These similarities suggest information-theoretic cryptography as a promising solution for resolving the trade-off between the requirements of cryptography in IoT.
AB - This chapter discusses the reason why we have chosen to study perfectly secure cryptography (as a branch of information-theoretic cryptography) among the existing approaches to cryptography in IoT. To this end, we take a systematic approach. We first introduce timeliness and resource constraint awareness as two critical requirements of cryptography in IoT and highlight the trade-off between them. Next, we use the existing research literature to establish an ecosystem as well as a life cycle for each of the following fields. Real-time cryptographyResource-constrained cryptography (including embedded and lightweight cryptography)Cryptography in IoTReal-time cryptographyResource-constrained (embedded and lightweight) cryptography in IoT In the next step, we demonstrate that all the developed ecosystems and life cycles are closely similar to each other. The ecosystems consist of similar enablers and application areas. Further, the life cycles include similar phases with similar challenges and issues in each phase. These findings lead to the formation of common ecosystems and life cycles for all of the aforementioned fields. Finally, we establish an ecosystem as well as a life cycle for information-theoretic cryptography and highlight their similarities to the common ecosystem and the common life cycle mentioned above. These similarities suggest information-theoretic cryptography as a promising solution for resolving the trade-off between the requirements of cryptography in IoT.
KW - Embedded cryptography
KW - Information-theoretic cryptography
KW - Internet of Things (IoT)
KW - Lightweight cryptography
KW - Real-time cryptography
KW - Resource-constrained cryptography
UR - http://www.scopus.com/inward/record.url?scp=85139501996&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85139501996&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-13191-2_2
DO - 10.1007/978-3-031-13191-2_2
M3 - Chapter
AN - SCOPUS:85139501996
T3 - Signals and Communication Technology
SP - 15
EP - 34
BT - Signals and Communication Technology
PB - Springer Science and Business Media Deutschland GmbH
ER -