Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

被引:4
|
作者
Fitzgibbon, Gregory [1 ]
Ottaviani, Carlo [2 ,3 ]
机构
[1] Tession Ltd, Quantum & AI Res, Cheadle SK8 1PY, Ches, England
[2] Univ York, Dept Comp Sci, York YO10 5GH, England
[3] Univ York, York Ctr Quantum Technol, York YO10 5GH, England
基金
英国工程与自然科学研究理事会;
关键词
post-quantum cryptography; Internet of Things; constrained devices; benchmarking;
D O I
10.3390/cryptography8020021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (in principle) solved by the Shor algorithm in polynomial time due to its ability to efficiently solve the discrete logarithm problem, potentially making present infrastructures insecure against a quantum attack. The National Institute of Standards and Technology (NIST) reacted with the post-quantum cryptography (PQC) standardization process to develop and optimize a series of post-quantum algorithms (PQAs) based on difficult mathematical problems that are not susceptible to being solved by Shor's algorithm. Whilst high-powered computers can run these PQAs efficiently, further work is needed to investigate and benchmark the performance of these algorithms on lower-powered (constrained) devices and the ease with which they may be integrated into existing protocols such as TLS. This paper provides quantitative benchmark and handshake performance data for the most recently selected PQAs from NIST, tested on a Raspberry Pi 4 device to simulate today's IoT (Internet of Things) devices, and provides quantitative comparisons with previous benchmarking data on a range of constrained systems. CRYSTALS-Kyber and CRYSTALS-Dilithium are shown to be the most efficient PQAs in the key encapsulation and signature algorithms, respectively, with Falcon providing the optimal TLS handshake size.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [32] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [33] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [34] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [35] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [36] Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
    Barton, Jon
    Buchanan, William J.
    Pitropakis, Nikolaos
    Sayeed, Sarwar
    Abramson, Will
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 551 - 561
  • [37] A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
    Kempf, Marcel
    Gauder, Nikolas
    Jaeger, Benedikt
    Zirngibl, Johannes
    Carle, Georg
    2024 23RD IFIP NETWORKING CONFERENCE, IFIP NETWORKING 2024, 2024, : 186 - 194
  • [38] A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
    Borges, Fabio
    Reis, Paulo Ricardo
    Pereira, Diogo
    IEEE ACCESS, 2020, 8 : 142413 - 142422
  • [39] Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance
    Doering, Ronny
    Geitz, Marc
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [40] A Survey of Post-Quantum Cryptography Migration in Vehicles
    Lohmiller, Nils
    Kaniewski, Sabrina
    Menth, Michael
    Heer, Tobias
    IEEE ACCESS, 2025, 13 : 10160 - 10176