Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The role of key encapsulation mechanism in end-to-end encryption agility - a case for telemetry data confidentiality
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0003-0183-3613
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-0518-6532
2025 (English)In: Procedia Computer Science / [ed] Maria Manuela Cruz Cunha & Nuno Mateus-Coelho, Elsevier, 2025, Vol. 263, p. 829-838Conference paper, Published paper (Refereed)
Abstract [en]

The study outlined in this paper assesses the implementation of Attribute-Based Encryption as a key encapsulation mechanism,culminating in a proposed end-to-end encryption solution for a cloud-based IoT management system and further simulation ofmigration to Kyber Post-Quantum Cryptography (PQC) key encapsulation mechanism. Though extensively used for efficientlygathering and sharing video surveillance data, these systems also collect telemetry information, which includes sensitive data. Thispaper presents a comprehensive study that examines the current understanding, methodologies, and challenges associated withsupporting the End-to-End Encryption (E2EE) approach to ensure the confidentiality of telemetry data.

Place, publisher, year, edition, pages
Elsevier, 2025. Vol. 263, p. 829-838
Series
Procedia Computer Science, ISSN 1877-0509
Keywords [en]
attribute-based encryption, audit log data, cryptographic agility, end-to-end encryption, key-encapsulation mechanism, kyber, telemetry
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:bth-27705DOI: 10.1016/j.procs.2025.07.100Scopus ID: 2-s2.0-105013961743OAI: oai:DiVA.org:bth-27705DiVA, id: diva2:1950111
Conference
2024 International Conference on Industry Sciences and Computer Science Innovation, iSCSi 2024, Porto, Oct 29-31, 2024
Available from: 2025-04-04 Created: 2025-04-04 Last updated: 2025-09-30Bibliographically approved
In thesis
1. Understanding the role of Key Encapsulation Mechanisms in Cryptographic Migrations: Towards Cryptographic-Agility in IoT Systems Based on End-to-End Encryption Approach
Open this publication in new window or tab >>Understanding the role of Key Encapsulation Mechanisms in Cryptographic Migrations: Towards Cryptographic-Agility in IoT Systems Based on End-to-End Encryption Approach
2025 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The increasing data-security regulation and cyber-threats requires IT vendors to use new cryptographic tools or refactor live systems to encrypt existing data. One step in that direction is integrating an appropriate security protocol and cryptographic software library during the system design phase. However, it is not sufficient when it happens to migrate existing data to encrypted form in the live system on-the-fly, re-encrypt data to a different encryption standard, or have the data of the same origin but encrypted with different standards. This thesis explores the new emergent area of cryptographic agility, which focuses on various challenges while adopting cryptographic migrations in live systems. We proposed End-to-End Encryption (E2EE) design for telemetry data security in two different applications: maritime surveillance and drone-management. We aimed to understand the role of Key Encapsulation Mechanism (KEM) cryptographic primitive in the data-security domain. The notion of crypto-agility constitutes a context-sensitive, activity-based perspective on data security. In this thesis, we aim at both understanding and exploring practical possibilities of this notion. We employ a mixed-methods approach to achieve our aim: Experimentation, Literature Review and Survey. We have studied and applied quantum-safe KEM cryptographic primitives to simulate practical cryptographic migration in live IoT systems. We have shown the importance of KEM security properties and the performance of KEM primitives for telemetry data confidentiality. We proposed new crypto-agility values and trade offs as decision making support tool for consumers of cryptographic technologies. Furthermore, we have employed systematization of knowledge to structure how different types of contributions developed various KEM notions, its influence on the standardization process, and presence in cryptographic software libraries over the last 40 years. The proposed approaches have been shown to be capable of explaining the role of KEM in cryptographic migrations and underlying properties of crypto agility. This can facilitate domain experts in narrowing down the scope of analysis while achieving sufficiency for cryptographic migrations in live IoT systems based on end-to-end encryption protocols.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2025. p. 160
Series
Blekinge Institute of Technology Licentiate Dissertation Series, ISSN 1650-2140 ; 2025:04
Keywords
Cryptographic agility, end-to-end encryption, application-level encryption, key-encapsulation mechanism
National Category
Security, Privacy and Cryptography
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-27713 (URN)978-91-7295-498-4 (ISBN)
Presentation
2025-09-24, J1630, Campus Karlskrona, 10:00 (English)
Opponent
Supervisors
Projects
Connect2SmallPorts
Available from: 2025-04-11 Created: 2025-04-11 Last updated: 2025-09-30Bibliographically approved

Open Access in DiVA

fulltext(498 kB)7 downloads
File information
File name FULLTEXT02.pdfFile size 498 kBChecksum SHA-512
dab40b706011d7653f1456736fa6e30428b5aff2f49fc44020d64cafc0d694bea9bd38f340aab449e62b0d1dcbdd4d98bbf05779385ed5e658c70ecb6e9bf6d1
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Silonosov, AlexandrHenesey, Lawrence

Search in DiVA

By author/editor
Silonosov, AlexandrHenesey, Lawrence
By organisation
Department of Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 7 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 171 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf