0% found this document useful (0 votes)
38 views7 pages

Analysis of Post Quantum Cryptography Algorithms Concerning Their Applicability To IoT Devices

This study evaluates post-quantum cryptographic algorithms for their suitability in resource-constrained Internet of Things (IoT) devices, addressing the security challenges posed by quantum computing. It identifies key algorithms such as lattice-based, hash-based, code-based, and multivariate-based cryptography that balance security and efficiency for IoT applications. The findings aim to guide manufacturers and security practitioners in selecting appropriate cryptographic solutions that comply with existing standards and ensure resilience against both classical and quantum threats.

Uploaded by

Stoyan Tanev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views7 pages

Analysis of Post Quantum Cryptography Algorithms Concerning Their Applicability To IoT Devices

This study evaluates post-quantum cryptographic algorithms for their suitability in resource-constrained Internet of Things (IoT) devices, addressing the security challenges posed by quantum computing. It identifies key algorithms such as lattice-based, hash-based, code-based, and multivariate-based cryptography that balance security and efficiency for IoT applications. The findings aim to guide manufacturers and security practitioners in selecting appropriate cryptographic solutions that comply with existing standards and ensure resilience against both classical and quantum threats.

Uploaded by

Stoyan Tanev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1

Analysis of Post Quantum Cryptography Algorithms


concerning their applicability to IoT devices
Hasham Sarwar
Bahria University Islamabad, Pakistan
[email protected]
Anjum Ashraaf
Bahria University Islamabad, Pakistan
[email protected]

Abstract—The increasing ubiquity of Internet of Things (IoT) center challenge lies not simply in that frame of mind of
devices has necessitated robust security measures, especially with post-quantum algorithms but in distinguishing ones that are
the impending threat of quantum computing to conventional upgraded for implementation on asset-completed IoT gadgets.
cryptographic protocols. In this study, we address the imperative
of selecting an optimized post-quantum cryptographic algorithm These gadgets frequently have restricted computational abili-
tailored for implementation on resource-constrained IoT devices ties, memory, and power assets contrasted with conventional
while ensuring compliance with stringent security standards. This registering frameworks. In this manner, any cryptographic ar-
research employs a comprehensive evaluation framework that rangement carried out inside the IoT system should find some
considers the unique constraints of IoT devices, including limited kind of harmony between security powerfulness and asset
computational capabilities and memory resources. Furthermore,
our assessment accounts for the diverse security requirements productivity [1]. Tending to this test requires a thorough as-
stipulated by prevailing standards to guarantee resilience against sessment system that takes into account the assorted elements
both classical and quantum threats. Through a systematic anal- affecting the reasonableness of post-quantum cryptographic
ysis of various post-quantum cryptographic algorithms, encom- calculations for IoT sending. One significant viewpoint is
passing factors such as computational efficiency and resistance to the computational proficiency of algorithms like NtruEncrypt
quantum attacks, this study identifies a select set of algorithms
that exhibit promising suitability for IoT device deployment. The [1], taking into account the requirements of IoT gadgets.
evaluation considers renowned standards, including NIST’s Post- Calculations that request negligible computational power while
Quantum Cryptography Standardization initiative to align with offering powerful protection from both regular and quantum
industry best practices and interoperability. The findings pre- dangers become crucial in this specific circumstance. Memory
sented in this study offer guidance to IoT device manufacturers, impression addresses another urgent thought. IoT gadgets, fre-
system architects, and security practitioners in making informed
decisions regarding the adoption of post-quantum cryptographic quently outfitted with restricted memory, require cryptographic
algorithms. The selected algorithms not only demonstrate adept- calculations that are light on memory utilization. Adjusting
ness in mitigating quantum threats but also address resource this prerequisite without settling for less on the security
constraints inherent in IoT environments, ensuring a secure stance of the algorithm turns into a characterizing model in
foundation for the rapidly expanding ecosystem of interconnected the determination cycle. Additionally, any picked calculation
devices.
requirements to line up with existing security guidelines to
Index Terms—Post Quantum, PQ cryptography for IoT, Iot guarantee interoperability, consistency, and future sealing.
Constrainted PQC Algorithm
Principles set by associations like NIST (Public Foundation of
Norms and Innovation) offer pivotal benchmarks for crypto-
I. I NTRODUCTION graphic conventions, guaranteeing they meet the tough security

P OST - quantum cryptography remains a basic wilderness


in getting the undeniably interconnected scene of IoT
gadgets. The IoT environment, portrayed by its huge swath
prerequisites while advancing similarity across different IoT
executions. The scene of post-quantum crypto-realistic cal-
culations is tremendous, with various competitors competing
of interconnected gadgets and frameworks, has upset ventures, for consideration. A few unmistakable competitors incorporate
homes, and urban communities, yet it additionally brings to the lattice-based, hash-based, code-based, and multivariate-based
front phenomenal security challenges. As these gadgets trade cryptographic plans, each with its one-of-a-kind qualities and
delicate data, the need to shield this information against arising shortcomings concerning IoT sending. Thinking about these
dangers, especially quantum registering, has become basic. calculations in contrast to foreordained models and principles
Quantum computing, with its capability to break customary becomes essential in the choice cycle [2]. Notwithstanding the
cryptographic calculations through its sheer computational cryptographic strength, factors like simplicity of execution,
power, represents a huge danger to the security infrastructure versatility to IoT- explicit correspondence conventions, and
on which present-day IoT frameworks depend. The vulnera- obstruction against side-channel assaults are additionally vital
bility of these frameworks requires a proactive methodology in the dynamic favorable to the process. These elements
— one that expects and mitigates likely breaks through the guarantee that the picked calculation not only satisfies the
reception of post-quantum cryptographic calculations. The security guidelines yet in addition coordinates crease lessly
2

inside the IoT biological system, defending against potential sizes, making it a likely possibility for IoT organizations.
weaknesses. The result of this assessment is essential, as it In any case, it requires cautious boundary choice to adjust
guides IoT gadget makers, framework engineers, and security security and proficiency in asset compelled conditions [5].
experts in coming to informed conclusions about the choice 4) Lattice-Based Cryptography: Lattice-based cryptogra-
and execution of post-quantum cryptographic calculations. phy has acquired huge consideration because of its robust-
The chosen calculations need to not just endure the dangers ness against quantum assaults and its flexibility in offering
presented by quantum computing yet in addition adjust to the different cryptographic natives. Plans like NTRUEncrypt and
asset requirements intrinsic in the IoT environment. Certainly! NTRUSign in light of lattice issues areas of strength for give
In the domain of post-quantum cryptography, a few groups and have shown promising flexibility to asset compelled IoT
of 4 cryptographic techniques have arisen as possible up- gadgets. They offer more modest key sizes and productive
and-comers for getting IoT gadgets against quantum dangers. executions, making them practical choices for getting IoT
These include hash-based, code-based, multivariate-based, and biological systems [6].
lattice-based cryptographic plans, each with its interesting
ascribes, what’s more, reasonableness for execution on asset
A. Quantum Threats
obliged IoT gadgets.
Quantum algorithms like Shor’s and Grover’s algorithm,
represents a considerable threat to existing cryptographic
frameworks, especially those utilized in asset obliged IoT
(Web of Things) gadgets. Shor’s calculation, for example, has
the ability to proficiently factor huge numbers, compromising
generally utilized cryptographic algorithm like RSA and ECC
(Elliptic Bend Cryptography). All the while, Grover’s calcu-
lation speeds up the method involved with looking through
unsorted information bases, possibly compromising symmetric
key cryptography.
The limited computational power of IoT gadgets fuel the
danger, as quantum PC progressed they could take advantage
of weaknesses in current Crypto-System. This increase the
requirement to adapt post-quantum cryptographic algorithm.
guaranteeing the security and protection of IoT environments
despite advancing computational capacities [7].
1) Grovers Algorithm: The goal is to look in an unstruc-
tured dataset, where there could be no prior information about
Fig. 1: Types of PQC the pursuit space. Traditional calculation routinely require
O(n) errands to find the ideal dataset in a vector space with N
1) Hash-Based Cryptography: Hash-based cryptographic parts. On the other hand, Grover’s estimation on a very basic
calculations, for example, the Merkle tree-based structures like level further develops efficiency by diminishing the fundamen-

XMSS (Broadened Merkle Mark Plan), offer flexibility against tal errands to simply O( n), presenting a quadratic speedup in
quantum assaults. These plans depend on the collision safe the chase cycle [20]. The states are prepared in superposition
properties of hash capabilities. XMSS, for example, gives a of qubit states, where the prophet i.e., a lot of unitary directors
stateful mark plot that can be proficiently executed on asset mark the game plan state in superposition, things being what
obliged gadgets. Its security comes from the one-wayness they are. Further improvement is done to extend the probability
of cryptographic hash capabilities, guaranteeing obstruction of the market state. The checking of the game plan is a
against quantum enemies [3]. singular step movement in QC, while improvement requires
2) Code-Based Cryptography: Code-based cryptographic Grover’s cycles. There emphasess achieve extended probability
calculations, prominently the McEliece cryptosystem, influ- of market state. Here, the quantum parallelism achieves the
ence the trouble of unraveling mistake amending codes to give wonderful advance as it plays out the all-on monster force
security. In spite of its huge security edges against quantum attack in a single step not by any stretch of the imagination
foes, the McEliece cryptosystem generally shows bigger key like the dated cycle procedure, where the savage power is
sizes, which could present difficulties with regards to IoT executed in an iterative circle for instance step-by- step.
gadgets with obliged assets. Notwithstanding, endeavors are 2) Shor’s Algorithm: Shor’s algorithm is famous for having
continuous to enhance its execution for IoT conditions by the potential to break the currently widely used encryption
diminishing its computational above [4]. (e.g., RSA), and it was the invention of Shor’s algorithm
3) Multivariate-Based Cryptography: UOV (Unbalanced that ignited the widespread interest in quantum computing
Oil and Vinegar) schemes which is bassically a Multivariate- in the late 1990s. The quantum computing part of Shor’s
based cryptographic schemes and it depend on the intricacy of algorithm is only for period finding. It is then combined with
addressing frameworks of multivariate polynomial conditions. a classical algorithm to perform integer factorization in order
UOV offers minimal marks and generally more modest key to break the classical encryption [21]. The implementation
3

correspondence in energy framework observing. Moreover,


they offer a near examination of these custom fitted execu-
tions on low-asset gadgets, for example, the Raspberry Pi,
during information transmission utilizing the Message Lining
Telemetry Transport (MQTT) convention. Results show that
the modified execution of NTRU beats both SABER and RSA
regarding computer processor and memory utilization, while
Fig. 2: Grovers Algorithm Light SABER arises as the leader while considering encryption
and unscrambling delays.
Jain et al. in [9] examined cryptography calculations and
of Shor’s algorithm allows the parallel implementation of conventions of IoT with various classifications. Coordinated
function, . This process requires classical computers steps PQC of Public Foundation of Principles and Innovation (NIST)
for each computation of. Whereas, the quantum superposition third level finalists on Raspberry Pi 4 (RPI4) board with
results in implementation of combinations of modular function Linux working framework. The presentation of Post-Quantum
in a single step by using the control and target qubit approach Cryptography plans for IoT has been assessed. At last, a Post-
to implement unitary operator of the function described above. Quantum Cryptography conspire has been recommended for
Here, due to modular function a periodicity in the states is the Web of Things in light of the presentation examination.
observed, this periodicity is extracted by applying the quantum T. M. Fernández-Caramés in [10] gave a study on post-
Fourier transform on the whole qubit register. Again, here quantum IoT frameworks (IoT frameworks safeguarded from
measuring the state would have not given enough information. the at present realized quantum registering assaults): the pri-
Further, classical evaluation methods like Chinese remainder mary post-quantum cryptosystems and drives were explored,
theorem are used for estimation of coprime numbers that form the most important IoT structures and difficulties were exam-
the key of RSA. The basic functions of all these algorithms ined, and the normal future patterns were demonstrated.
S. Sarıbaş et al. in [11] picked three key epitome systems
and two computerized signature calculations with various
boundary sets from the cycle three entries. They estimated
their TLS 1.3 handshake execution utilizing two asset obliged
gadgets and contrasted it with that of old style encryption
and advanced signature plans. Try results showed that post-
quantum calculations accompany an additional message above
while their handshake defer values are promising.
J. Señor et al. in [1]measures the exhibition of one of the fi-
nalists of the normalization cycle called NTRU and carried out
Fig. 3: Quantum Parallelism
it in a custom remote sensor hub intended for applications in
can be reduced in three simple steps, the outrageous edge of the IoT. The cryptosystem is executed
and assessed inside the cycles of the Contiki-NG working
• Apply superposition to all the qubits in one register.
framework. Moreover, extra examinations are performed to
• Have another register initialized as needed.
check in the event that ordinarily coordinated equipment pe-
• Apply a controlled-unitary operation on the second reg-
ripherals for cryptography inside present day microcontrollers
ister with control at the first register of qubits.
can be utilized to accomplish better execution with NTRU, at
Here, controls can be on multiple and different qubit registers, the single hub level as well as at the organization level, where
which results in different state of second register for each the NTRU key exemplification component is tried in a genuine
respective control state. Here, the actual parallelism is applied. correspondence process. The outcomes got from these tests
Further, different amplification or Fourier transform can be show that NTRU is reasonable for current microcontrollers
applied as per need. Here, measurement is not the solution. focusing on remote sensor networks plan, while old gadgets
present in well known stages probably won’t manage the cost
II. R ELATED S TUDIES of the expense of its execution.
The internet of Things (IoT) plays expected an essential Asif et al. in [12] gave an exhaustive study to academic local
part in the headway of correspondence innovation and in area with complete data on rudimentary numerical realities, as
our day to day lives. Satrya et al. in [8] tended to security well as to address continuous execution, equipment engineer-
lacunae in the geography and design of IoT energy observing ing, open issues, assault vectors, and the importance for the
frameworks utilizing post-quantum cryptographic strategies. IoT organizations. The study includes comes about because
They proposed custom fitted executions of the Rivest-Shamir- of existing traditional calculations and understanding into the
Adleman (RSA), N-th degree Shortened Polynomial Ring post quantum hash based cryptography.
Units (NTRU), and a set-up of cryptographic natives in O. M. Guillen et al. in [13] introduced an examination
view of Module Learning With Adjusting (Saber) as post- of NTRUEncrypt’s benefits over other cryptosystems for use
quantum cryptographic competitor calculations for IoT gad- in such gadgets. They depict four unique NTRUEncrypt
gets. These expect to get distributer supporter start to finish executions on an ARM Cortex M0-based microcontroller,
4

think about their outcomes, and show that NTRUEncrypt is Contrasted with the plain SW execution on RISC-V, our
appropriate for use in battery-worked gadgets. They present outcomes show a speedup element of up to 2.79 to the
execution and memory impression figures for various security detriment of a 12.4 percent assets above. Public Organization
boundaries, as well as energy utilization in an asset compelled of Guidelines and Innovation (NIST) reported SHA-3 as the
microcontroller to reinforcement these cases. new norm for better security. SHA-3 is additionally taken
Seyhan et al. in [14] analyzed crucial attributes and layered advantage of in the vast majority of the ongoing post-quantum
design of IoT conditions. Essential security necessities and cryptographic (PQC) conventions.
arrangement innovations for IoT design were recollected. A A. Khalid in [19] studies the common sense of organization
few significant open issues in the writing for IoT gadget of Cross section based Calculations (LBC) plans. In this
security are reviewed. From these open issues, the post- unique circumstance, the cutting edge LBC executions on the
quantum security of IoT gadgets with restricted assets is obliged gadgets (counting low-power FPGAs and implanted
engaged. The fundamental reason for their paper is to further chip), driving as far as low-power impression, little region,
develop the obliged asset order and give a perspective for post- minimized data transfer capacity necessities and elite execu-
quantum IoT security. In this specific circumstance, a touchy tion is reasonably assessed and seat stamped. The work closes
characterization is proposed by further developing the re- by distinguishing a set-up of some most loved LBC plans as
stricted asset grouping of IETF. The cryptosystem proficiency far as different IoT basic execution seat marks.
definition is made for the examination of asset obliged gadget
security. Utilizing the proposed arrangement and effectiveness III. O UR C ONTRIBUTION
definition, the use of grid based cryptosystems in asset obliged In our investigation, we dig into the assessment of post-
IoT gadget security is dissected. quantum calculations concerning their speed and adherence
S. Ebrahimi et al. in [15] Propose InvRBLWE, an ad- to the NIST security standard. Collecting assorted discoveries
vanced variation for double learning with blunders over the from different sources, we unite this data into a complete
ring (Ring-LWE) plot that is shown to be secure against paper to recognize the most effective calculations for IoT
quantum assaults and is exceptionally effective for equipment gadgets, accentuating both speed and security con- sidera-
executions. They propose two designs for InvRBLWE: 1) tions. Our methodology includes investigating the presenta-
a high velocity engineering focusing tense and strong IoT tion furthermore, energy utilization effects of current post-
gadgets and 2) a ultralightweight design, which can be carried quantum key trade components, especially those partaking in
out on asset obliged hubs in IoT. They give trial results the NIST normalization process. We select calculations helpful
to two adaptations of the InvRBLWE plot giving 84 and to programming executions and continue to quantify their im-
190 pieces of exemplary security. Their execution results on settlement on asset obliged IoT gadgets. The summit of our
field programmable door exhibit overwhelm the best of the work offers rules for choosing ideal cryptosystems for IoT
work of art and post-quantum past executions. In addition, gadgets, taking into account the predetermined requirements.
two distinct application explicit coordinated circuit (ASIC) Our commitments are illustrated as follows:
executions show improvement with regards to speed, region,
• Showing the joining of post-quantum cryptosys- tems into
power, or potentially energy.
K. Mayes et al. in [16] introduced examination from a IoT gadgets in their current structure.
• Consolidating round 3 calculations in the NIST contest
down to earth execution of the Kyber768 CPAPKE public
key encryption part on a MULTOS IoT Trust-Anchor chip. for post-quantum encryption norms into predominant IoT
The examination thought about memory and speed necessities, programming and equipment.
• Measuring the effect of different post-quantum encryp-
and improvements, and looked at the NTT change variant
of Kyber, introduced in Cycle 1 of the NIST rivalry, with tion calculations on gadget asset utilization.
• Giving useful rules to choosing a cryptosys- tem custom-
the Kroenecker multiplier method that takes advantage of
an equipment crypto-coprocessor. The work started with a made to the imperatives forced on IoT gadgets
nonexclusive multi-round multiplier approach, which was then
superior utilizing an original change of the info information, IV. M ETHODS
permitting an implicit particular duplicate capability to be In this SLR we present different but important cryptosys-
utilized, essentially speeding up an increase round, and mul- tems participating in the NIST standardization process, we also
tiplying the useable size of the equipment multiplier. consider the resource-constrained IoT. we primarily focus on
R. Ristov et al. in [17] investigated public key encryption highlighting their key aspect along with the time needed to
(PKE) with post quantum cryptography (PQC) calculation Ky- generate key pairs, encryption, and decryption on Raspberry Pi
ber, in spite of it being typically utilized as key-exemplification 4. In our final phase, we try to identify and provide justification
system (KEM). The proposed approach has been assessed for different aspects and reasons behind the selection of these
tentatively. The led explore scrambles the information on one algorithms by using a systematic process of data collection,
situation on the IoT gadget itself and in the other situation the exploration, and interpretation Our objective is to conduct
information is encoded on a haze hub. a comprehensive analysis of diverse results extracted from
Alessandra et al. in [18] proposed a Keccak gas pedal to various papers. we specifically chose those papers that perform
accelerate SHA3 calculations for the Gems Kyber calculation their experiment on Raspberry Pi for our specific purpose
on the RISCV-based progressed microcontroller PULPissimo. which is to extract the most suitable post-quantum algorithm
5

for key sharing and digital signatures within the considered Algorithm Key Gen Encrypt Decrypt
context.
Our picked area of assessment rotates around post-quantum Kyber 649678 884848 985258
cryptosystems of definite round in the NIST normalization Lightsaber 1051530 1538646 1861934
process. This determination is propelled by the expectation of
TABLE III: Analysis of the Kyber and LightSaber [1]
these cryptosystems being integrated into industry organiza-
tions and coordinated into libraries that asset obliged gadgets
will use for web correspondence. Crypto Variant Key Encapsulation Decapsulation
As of the ongoing composition, the NIST normalization System Genera-
tion
process is progressing through its third stage, highlighting
fifteen up-and-comers. Among these, seven have been assigned Kyber Kyber512 237267 252163.8 252939.6
as finalists, while eight are being considered as possible Saber Saber-KEM 358270.2 357384.6 356729.4
other options. This unique scene prompts our examination
concerning their flexibility, taking into account the advancing TABLE IV: Analysis of Post-Quantum Cryptography for In-
idea of the determination cycle. Table I shows the finalists for ternet of Things [9]
NIST normalization. As per the writing, the cryptosystems
generally reasonable to asset obliged gadgets are those cross
section based [22]. Table VI presents execution measurements for the Kyber512
post-quantum secure calculation in the TLS convention, ex-
Public-Key Encryption/KEM Digital Signatures plicitly zeroing in on key age, encapsulation, and decapsulation
processes. The outcomes exhibit the calculation’s effectiveness
Classic McEliece CRYSTALS-DILITHIUM
in cryptographic tasks.
CRYSTALS-KYBER FALCON Table VII gives a relative investigation of post-quantum
NTRU Rainbow cryptosystems for Web of-Things (IoT) applications, exhibit-
Saber ing key age, encapsulation, and decapsulation times for Ky-
ber512 and LightSaber calculations. The outcomes highlight
TABLE I: Post-Quantum Cryptosystems Parameters the presentation varieties between these cryptographic frame-
works with regards to IoT security.
Table II below shows the algorithms and their parameters Table VIII frameworks the presentation measurements for
associated with them. The table also highlights the security various Kyber key boundaries, introducing the time taken for
level of each algorithm as per NIST security standards. key pair age, encryption, and decryption process. Quite, the
table features the productivity of Kyber512 and Kyber512 aes
Algorithm Public- Private- Ciphertext Security
Key Key Size Level in different cryptographic tasks, estimated in milliseconds.
Size Size Table IX gives execution measurements to various key
boundaries, including the time expected for key pair age,
SABER 672 992 1312 1
(LightSaber)
encryption, and decoding processes. Prominently, it grand-
stands the proficiency of EES1087EP2, APR2011 439 fast,
CRYSTAL- 1632 800 736 1
KYBER and APR2011 743 fast in different cryptographic activities,
NTRU 699 935 699 1
estimated in milliseconds.
Table X presents execution measurements for various key
NTRU Prime 897 1125 1025 2
boundaries, including key pair age, encryption, and decoding
FrodoKEM 9616 19888 9720 1
processes estimated in a large number of cycles (k Cycle).
TABLE II: Post-Quantum Cryptosystems Parameters Furthermore, it gives data on the measures of private keys,
public keys, plaintexts, and ciphertexts in bytes. The outcomes
Table (III) provides a comparative analysis of clock cycle offer bits of knowledge into the computational necessities and
efficiencies for key generation, encryption, and decryption in information sizes related with key tasks for the predetermined
the Kyber and LightSaber cryptographic algorithms. Mean- key boundaries.
while, the table (IV) offers additional insights into specific Table XI gives key boundary execution measurements to
variants such as Kyber512 and Saber-KEM, detailing their the Hawk cryptographic framework, highlighting key age,
respective performances in key generation, encapsulation, and marking, and confirmation processes estimated in a great many
decapsulation operations. cycles (k Cycle). Moreover, it remembers the size of the pro-
The Table V presents an exhibition examination of post- duced computerized signature for bytes. These measurements
quantum cryptographic calculations, explicitly Dilithium2 and offer experiences into the computational expenses and mark
Falcon512, with regards to key age, encapsulation, and de- sizes related with Falcon 512 key activities.
capsulation tasks. Clock cycle efficiencies are accounted for Table XII presents key parameter performance metrics
each cryptographic variation, giving experiences into their for the Sha256withRSA cryptographic system, including key
computational prerequisites for secure tasks with regards to generation, signing, and verification processes measured in
the Web of Things. thousands of cycles (k Cycle). The table also indicates the
6

Crypto Variant Key Gen Encapsulation Decapsulation Key Parameter KeyPair Encryption Decryption
System (ms) (ms) (ms)

Dilithium Dilithium2 483283.8 2034835.2 485231.4 EES1087EP2 3130434 223633 223600


Falcon Falcon- 87717058.2 23680247.4 269701.2 APR2011 439 fast 2233455 120414 51756
512
APR2011 743 fast 1376045 154800 86756

TABLE V: Analysis of Post-Quantum Cryptography for Inter- TABLE IX: Key Parameter Performance Metrics
net of Things [9]

Key KeyPair Encrypt Decrypt Private Public Plain Cipher


Crypto System Key Gen Encapsulation Decapsulation Params (k (k (k Key Key Text (Bytes)
Cycle) Cycle) Cycle) (Bytes) (Bytes) (Bytes)
Kyber512 21240000 20340000 20340000
1024 688110 619211 378432 634 162 26 128
TABLE VI: Evaluating the performance of post-quantum 2048 3870110 223622 739621 1217 294 26 256
secure algorithms in the TLS protocol [11]
TABLE X: Key Parameter Performance Metrics

size of the generated digital signature in bytes. These metrics


provide insights into the computational costs and signature beats others to the extent that speed while staying aware of
sizes associated with Sha256withRSA key operations. NIST security Level 2 rules.
Table XIII sums up key execution measurements for These conclusions start from a social event of results from
Dilithium cryptographic frameworks, exhibiting key age, various examinations inside this space, expressly drove on
marking, and confirmation processes estimated in 1000 cycles. Raspberry Pi 4 hardware, setting the legitimacy and meaning
Also, it gives the size of the produced computerized signature of our disclosures.
in bytes. The introduced measurements offer a brief outline of Our survey, zeroed in on the lattice based post-quantum
computational expenses and mark sizes related with Dilithium instruments from the US Public Association of Standards
key tasks. standardization process, highlighted finding plans sensible for
devices with confined computational resources. Strikingly, we
V. C ONCLUSION picked varieties with lower security levels that really save a
After a broad assessment of various post-quantum crypto- satisfactory level of safety for standard use, restricting the
graphic computations, with a particular highlight on network computational load on these devices.
based parts, our assessment contemplated that Kyber 512 In our assessment, the trade off generally turns around the
stands separated as the best choice, basically in light of its agreement among security and time viability, unequivocally
striking pace in key age, encryption, and decryption. It meets among Kyber512 and the NTRU Variety APR2011 439 fast.
the NIST security level 1 rules, going with it a lively decision, Kyber512 displays prevalent speed, restricting time necessities,
especially earnest despite the undeniable peril introduced by however the NTRU variety boasts the main level security
quantum computers to Web correspondences. among the idea about estimations.
For resource obliged contraptions, similar to those normal Kyber512’s fortitude lies in its adequacy and speed, ensur-
in the Trap of Things (IoT), Kyber 512 grandstands imma- ing expedient cryptographic exercises. Of course, the NTRU
terial time complexities, conveying it significantly sensible Variety APR2011 439 speedy prevails with regards to giving
and secure. Regardless, if time complexity is certainly not a raised wellbeing endeavors, offering generous security for
fundamental concern, the NTRU variety APR2011 439 fast delicate data.

Crypto System Key Generation (ms) Encapsulation Decapsulation Key Params Key Sign (k Verify Sign
Gen (k Cycle) (k size
Kyber512 50434455 22324454 21784556 Cycle) Cycle) (Bytes)
LightSaber 5445674 28624566 27360444 falcon 512 28232300 2523200 221100 658

TABLE VII: A Comparative Study of Post-Quantum Cryp- TABLE XI: Falcon Key Parameter Performance Metrics
tosystems for Internet-of-Things Applications [8]”
Key Params Key Sign (k Verify Sign
Kyber Key Pa- KeyPair (ms) Encryption Decryption Gen (k Cycle) (k size
rameters (ms) (ms) Cycle) Cycle) (Bytes)

kyber512 464400 206400 240800 Sha256RSA 3123400 112800 17200 256


kyber512 aes 567600 206400 137600
TABLE XII: Key Parameter Performance Metrics for
TABLE VIII: Kyber Performance Metrics Sha256withRSA
7

Key Params Key Gen Sign Verify Sign [15] S. Ebrahimi, S. Bayat-Sarmadi and H. Mosanaei-Boorani, ”Post-
(1000 (1000 (1000 size Quantum Cryptoprocessors Optimized for Edge and Resource-
Cycle) Cycle) Cycle) (Bytes) Constrained Devices in IoT,” in IEEE Internet of Things Journal, vol. 6,
no. 3, pp. 5500-5507, June 2019, doi: 10.1109/JIOT.2019.2903082.
dilithium2 1225400 1423400 751230 2420 [16] K. Mayes, ”Performance Evaluation and Optimisation for Kyber on the
MULTOS IoT Trust-Anchor,” 2020 IEEE International Conference on
dilithium2 aes 1667800 2445600 378400 2420 Smart Internet of Things (SmartIoT), Beijing, China, 2020, pp. 1-8, doi:
10.1109/SmartIoT49966.2020.00010.
TABLE XIII: Dilithium Key Parameter Performance Metrics [17] R. Ristov and S. Koceski, ”Quantum Resilient Public Key Cryptog-
raphy in Internet of Things,” 2023 12th Mediterranean Conference on
Embedded Computing (MECO), Budva, Montenegro, 2023, pp. 1-4, doi:
10.1109/MECO58584.2023.10154994.
The choice between these estimations requires a canny idea [18] Alessandra Dolmeta, Mattia Mirigaldi, Maurizio Martina, and Guido
of the specific necessities: whether improving for faster taking Masera. 2023. Implementation and integration of Keccak accelera-
tor on RISC-V for CRYSTALS-Kyber. In Proceedings of the 20th
care of times or zeroing in on most outrageous security for the ACM International Conference on Computing Frontiers (CF ’23). As-
mixed data. sociation for Computing Machinery, New York, NY, USA, 381–382.
https://doi.org/10.1145/3587135.3591432
[19] A. Khalid, S. McCarthy, M. O’Neill and W. Liu, ”Lattice-based Cryp-
tography for IoT in A Quantum World: Are We Ready?,” 2019 IEEE 8th
R EFERENCES International Workshop on Advances in Sensors and Interfaces (IWASI),
Otranto, Italy, 2019, pp. 194-199, doi: 10.1109/IWASI.2019.8791343.
[1] J. Señor, J. Portilla and G. Mujica, ”Analysis of the NTRU Post-
[20] Habibi, Mohammad Reza, Saeed Golestan, Ali Soltanmanesh, Josep
Quantum Cryptographic Scheme in Constrained IoT Edge Devices,” in
M. Guerrero, and Juan C. Vasquez. 2022. ”Power and Energy
IEEE Internet of Things Journal, vol. 9, no. 19, pp. 18778-18790, 1 Oct.1,
Applications Based on Quantum Computing: The Possible Po-
2022, doi: 10.1109/JIOT.2022.3162254.
tentials of Grover’s Algorithm” Electronics 11, no. 18: 2919.
[2] Kumar, Adarsh and Ottaviani, Carlo and Gill, Sukhpal Singh and Buyya,
https://doi.org/10.3390/electronics11182919
Rajkumar. (2021). Securing the future internet of things with post-
[21] Wong, H.Y. (2024). Shor’s Algorithm. In: Introduction to Quantum
quantum cryptography. Security and Privacy. 5. 10.1002/spy2.200.
Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-36985-8-
[3] B. Ravinder Reddy, T. Adilakshmi, ”Merkle Tree-based Access Structure 29
for Sensitive Attributes in Patient-Centric Data,” International Journal of [22] Post-Quantum Cryptography. 2021. Available online:
Engineering Trends and Technology, vol. 70, no. 6, pp. 106-113, 2022. https://csrc.nist.gov/Projects/post-quantum-cryptography/Post-Quantum-
Crossref, https://doi.org/10.14445/22315381/IJETT-V70I6P213 Cryptography-Standardization
[4] Biswas, Bhaskar & Sendrier, Nicolas. (2008). McEliece Cryptosystem
Implementation: Theory and Practice. 47-62. 10.1007/978-3-540-88403-
3 4.
[5] Kipnis, A., Patarin, J., Goubin, L. (1999). Unbalanced Oil and Vinegar
Signature Schemes. In: Stern, J. (eds) Advances in Cryptology — EURO-
CRYPT ’99. EUROCRYPT 1999. Lecture Notes in Computer Science, vol
1592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48910-
X 15
[6] Pradhan, Pawan & Rakshit, Sayan & Datta, Sujoy. (2019). Lattice Based
Cryptography : Its Applications, Areas of Interest & Future Scope. 988-
993. 10.1109/ICCMC.2019.8819706.
[7] Althobaiti, Ohood & Dohler, Mischa. (2021). Quantum-Resistant Cryp-
tography for the Internet of Things Based on Location-Based Lattices.
IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3115087.
[8] Satrya, Gandeva Bayu, Yosafat Marselino Agus, and Adel Ben Mnaouer.
2023. ”A Comparative Study of Post-Quantum Cryptographic Algorithm
Implementations for Secure and Efficient Energy Systems Monitoring”
Electronics 12, no. 18: 3824. https://doi.org/10.3390/electronics12183824
[9] S. P C, K. Jain and P. Krishnan, ”Analysis of Post-Quantum Cryptography
for Internet of Things,” 2022 6th International Conference on Intelligent
Computing and Control Systems (ICICCS), Madurai, India, 2022, pp.
387-394, doi: 10.1109/ICICCS53718.2022.9787987.
[10] T. M. Fernández-Caramés, ”From Pre-Quantum to Post-Quantum IoT
Security: A Survey on Quantum-Resistant Cryptosystems for the Internet
of Things,” in IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6457-
6480, July 2020, doi: 10.1109/JIOT.2019.2958788.
[11] S. Sarıbaş and S. Tonyalı, ”Performance Evaluation of TLS 1.3
Handshake on Resource-Constrained Devices Using NIST’s Third
Round Post-Quantum Key Encapsulation Mechanisms and Digital Sig-
natures,” 2022 7th International Conference on Computer Science and
Engineering (UBMK), Diyarbakir, Turkey, 2022, pp. 294-299, doi:
10.1109/UBMK55850.2022.9919545.
[12] Asif, Rameez. 2021. ”Post-Quantum Cryptosystems for Internet-of-
Things: A Survey on Lattice-Based Algorithms” IoT 2, no. 1: 71-91.
https://doi.org/10.3390/iot2010005
[13] O. M. Guillen, T. Pöppelmann, J. M. Bermudo Mera, E. F. Bongenaar, G.
Sigl and J. Sepulveda, ”Towards post-quantum security for IoT endpoints
with NTRU,” Design, Automation and Test in Europe Conference and
Exhibition (DATE), 2017, Lausanne, Switzerland, 2017, pp. 698-703, doi:
10.23919/DATE.2017.7927079.
[14] Seyhan, K., Nguyen, T.N., Akleylek, S. et al. Lattice-based cryp-
tosystems for the security of resource-constrained IoT devices in post-
quantum world: a survey. Cluster Comput 25, 1729–1748 (2022).
https://doi.org/10.1007/s10586-021-03380-7

You might also like