Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

被引:4
|
作者
Fitzgibbon, Gregory [1 ]
Ottaviani, Carlo [2 ,3 ]
机构
[1] Tession Ltd, Quantum & AI Res, Cheadle SK8 1PY, Ches, England
[2] Univ York, Dept Comp Sci, York YO10 5GH, England
[3] Univ York, York Ctr Quantum Technol, York YO10 5GH, England
基金
英国工程与自然科学研究理事会;
关键词
post-quantum cryptography; Internet of Things; constrained devices; benchmarking;
D O I
10.3390/cryptography8020021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (in principle) solved by the Shor algorithm in polynomial time due to its ability to efficiently solve the discrete logarithm problem, potentially making present infrastructures insecure against a quantum attack. The National Institute of Standards and Technology (NIST) reacted with the post-quantum cryptography (PQC) standardization process to develop and optimize a series of post-quantum algorithms (PQAs) based on difficult mathematical problems that are not susceptible to being solved by Shor's algorithm. Whilst high-powered computers can run these PQAs efficiently, further work is needed to investigate and benchmark the performance of these algorithms on lower-powered (constrained) devices and the ease with which they may be integrated into existing protocols such as TLS. This paper provides quantitative benchmark and handshake performance data for the most recently selected PQAs from NIST, tested on a Raspberry Pi 4 device to simulate today's IoT (Internet of Things) devices, and provides quantitative comparisons with previous benchmarking data on a range of constrained systems. CRYSTALS-Kyber and CRYSTALS-Dilithium are shown to be the most efficient PQAs in the key encapsulation and signature algorithms, respectively, with Falcon providing the optimal TLS handshake size.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91
  • [2] Feasibility and Benchmarking of Post-Quantum Cryptography in the Cooperative ITS Ecosystem
    Lonc, Brigitte
    Aubry, Alexandre
    Bakhti, Hafeda
    Christofi, Maria
    Mehrez, Hassane Aissaoui
    2023 IEEE VEHICULAR NETWORKING CONFERENCE, VNC, 2023, : 215 - 222
  • [3] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [4] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [5] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [6] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [7] A Performance Evaluation of IPsec with Post-Quantum Cryptography
    Bae, Seungyeon
    Chang, Yousung
    Park, Hyeongjin
    Kim, Minseo
    Shin, Youngjoo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 249 - 266
  • [8] Hardware Design and Implementation of Post-Quantum Cryptography Kyber
    Zeng, Qingru
    Li, Quanxin
    Zhao, Baoze
    Jiao, Han
    Huang, Yihua
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [9] Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography
    Ravi, Prasanna
    Sundar, Vijaya Kumar
    Chattopadhyay, Anupam
    Bhasin, Shivam
    Easwaran, Arvind
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [10] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +