It can be said that the Next-Generation Internet of Things (NG-IoT), powered by the flexibility, wide range of data-rates, support of heterogeneity, ultralow latency, intelligence and massive user capacities delivered by 5G and 6G networks, will be the main driver for economic growth and human development for the next decades. Among others, an important impact of 5G/6G and the NG-IoT is that these technologies will allow the user to use sensors and mobile devices more effectively and efficiently, according to their needs and the characteristics of the operating environment. To elaborate, while today most connected services are accessed from an APP or website running a smartphone, with the NG-IoT connected services will be provided by a multitude of devices embedded in the environment itself. Under such a scenario, however, security and in particular, light-weight, embedded, intelligent and ubiquitous security becomes an absolute necessity, or better enabler, without which the NG-IoT is unfeasible as sensitive information from users such as personal, health-related and financial data would be exposed.
In an environment such as the one described, secure access to information requires user's continuous authentication and the proliferation of services means that password-based authentication degrades the user's experience and causes bad practices in the generation and custody of such paswords. Add to the later the notion that with the NG-IoT users will interact daily with countless devices, many of which will behave autonomously, and the potential disaster in terms of vulnerabilities of private and sensitive information is clear.
Fortunately, the source of the problem is also its solution, as Information and Communications Technologies (ICT), and in particular information security and wireless communications technologies have within them all the features from which to derive the necessary measures to counteract security vulnerabilities. For example, one of the most fundamental emerging problems in data security is the raise of quantum computing and machine learning, which may soon result in such an increase in computational and inference capabilities that even the most complex encryption techniques might be exposed, because encryption keys are essentially pseudo-random numbers, where the word pseudo indicates that no computer can generate truly random numbers, but only numbers whose generation is hard to reengineer today, and which sophisticated machine learning algorithms running on powerful quantum computers might soon easily break.
Fortunately, the wireless channel has the physical property of being reciprocal and particular to a pair of transmitter-receiver, such that truly random secret keys can be generated taking advantage of the characteristics of such a channel. Indeed, according to the theoretical principles of information, secret messages can be exchanged between a source and a receiver taking advantage of the physical characteristics of the medium to build confidential channels. Project ORACLE will focus on these and other emerging techniques, aiming to resolve the security vulnerabilities of NG-IoT.
Publicaciones
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope V Gayoso Martínez, L Hernández Encinas, A Martín MuñozLogic Journal of the IGPL, 2022;, jzac011https://doi.org/10.1093/jigpal/jzac011 | GiCSI |
Analysis of the FO Transformation in the Lattice-Based Post-Quantum AlgorithmsGonzález de la Torre MÁ, Hernández Encinas L, Queiruga-Dios AMathematics 2022, 10, 2967.https://doi.org/10.3390/math10162967 | GiCSI |
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum CallGonzález de la Torre, M.Á., Hernández Encinas, L.P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 75-85, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022https://doi.org/10.1007/978-3-031-18409-3_8 | GiCSI |
Comparative analysis of lattice-based post-quantum cryptosystemsM.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez GarcíaXVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121-126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria, Santander, Octubre 19-21, 2022ISBN: 978-84-19024-14-5 | GiCSI |
State of the Art of Cybersecurity in Cooperative, Connected and Automated MobilityCastillo Campo, Ó., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A., Álvarez Fernández, R.P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 104–113, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022https://doi.org/10.1007/978-3-031-18409-3_11 | GiCSI |
Biometrics and Artificial Intelligence: Attacks and ChallengesL. Hernández-Álvarez, L. González-Manzano, J.M. Fuentes and L. Hernández Encinaspp. 213–240 in the book “Breakthroughs in Digital Biometrics and Forensics”, Springer, 2022https://doi.org/10.1007/978-3-031-10706-1_10 | GiCSI |
Comparative analysis of lattice-based post-quantum cryptosystemsM.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez GarcíaXVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121–126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria. Santander, Octubre 19–21, 2022ISBN: 978-84-19024-14-5 | GiCSI |
About the FrodoKEM lattice-based algorithmM. A. González de la Torre, L. Hernández Encinas and A. Queiruga DiosProc. VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 253-256, J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, June 27-29, 2022ISBN: 978-84-88734-13-6 | GiCSI |
Futuros Estándares de la Criptografía PostcuánticaLuis Hernández EncinasCongreso Bienal de la Real Sociedad Matemática Española (RSME), Sesión especial de Criptografía, pág. 115, Pamplona, 23 de enero 2024 | GiCSI |
Análisis comparativo de las firmas digitales postcuánticas basadas en retículosE. Iglesias Hernández, L. Hernández-Álvarez L. Hernández Encinas y J. I. Sánchez GarcíaActas de las IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 404-411, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8https://idus.us.es/handle/11441/160623 | GiCSI |
Ataques por canal lateral contra AES mediante correlación de consumo de potenciaM.A. González de la Torre, V. Sarasa Laborda, L. Hernández-Álvarez, I. Morales Sandoval, L. Hernández EncinasIX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 420-427, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8https://hdl.handle.net/11441/160773 | GiCSI |
Structural analysis of Code-based Algorithms of the NIST Post-Quantum CallM. A. González de la Torre, L. Hernández Encinas and J. I. Sánchez GarcíaLogic Journal of the IGPLhttps://doi.org/10.1093/jigpal/jzae071 | GiCSI |
Cybersecurity trends in Cooperative, Connected and Automated MobilityO. Castillo Campo, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Álvarez Fernández,Logic Journal of the IGPL, 2024, jzae072https://doi.org/10.1093/jigpal/jzae072 | GiCSI |
How to Attack a Galaxy: From Star Wars to Star TrekL. Hernández-Álvarez, M. Á. G. de la Torre, E. I. Hernández and L. H. EncinasComputer Science, Computer Engineering, & Applied Computing (CSCE), Las Vegas, NV, USA, 2023, pp. 2347-2354https://doi.org/10.1109/CSCE60160.2023.00381 | GiCSI |
Congresos y reuniones, conferencias
Situación actual de la Criptografía PostcuánticaConferencia invitada Luis Hernández Encinas |
GiCSI |
Futuros Estándares de la Criptografía PostcuánticaPresentación oral Luis Hernández Encinas Congreso Bienal de la Real Sociedad Matemática Española Del 22 al 26 de enero de 2024, Pamplona, España. |
GiCSI |
How to attack a galaxy: from Star Wars to Star TrekPresentación oral L. Hernández-Álvarez, M.A. González de la Torre, E. Iglesias Hernández, and L. Hernández Encinas 2023 International Conference on Security and Management (Worldcomp-SAM’23) Del 24 al 27 de julio de 2023, Las Vegas, EE.UU. |
GiCSI |
Comparative analysis of lattice-based post-quantum cryptosystemsPresentación oral M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García |
GiCSI |
Cibersecurity in Future Connected SocietiesOrganización de congresos Special Session organized by Víctor Gayoso Martínez (Institute of Physical and Information Technologies, Spanish National Research Council, CSIC) and Professor Koji Ishibashi (University of Electrocommunications, Japan) as part of the 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS) that will be held in Salamanca (Spain) in September 2022. For more information, visit http://www.2022.cisisconference.eu/accepted-special-sessions/ |
GiCSI |