Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures

No Thumbnail Available

Date

2022

Journal Title

Journal ISSN

Volume Title

Publisher

Institute of Electrical and Electronics Engineers Inc.

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

0

OpenAIRE Views

112

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Top 10%

Research Projects

Journal Issue

Abstract

Towards the end of the 20. century, quantum computing came into sight by the main effect of Shor's Algorithm. While this algorithm offers a solution for the factorization problem, which makes it exponentially faster, it alongside becomes a critical threat for the encryption schemes since mostly their security mechanisms rely on the difficulty of integer factorization or discrete log problems. Despite it is not known when advanced quantum computers will show up, yet, once it is developed, most existing cryptography will be rendered useless, which means all existing information security will be vulnerable. Owing to this risky situation, The National Institute of Standards and Technology (NIST) launched post-quantum cryptography (PQC) standardization process for the development of PQC schemes. In this paper, we have chosen three key encapsulation mechanisms and two digital signature algorithms with different parameter sets from the round three submissions. We measured their TLS 1.3 handshake performance using two resource-constrained devices and compared it to that of classical encryption and digital signature schemes. Experiment results showed that post-quantum algorithms come with an extra message overhead while their handshake delay values are promising. © 2022 Elsevier B.V., All rights reserved.

Description

Keywords

Digital Signature, Dilithium, Falcon, Key Encapsulation Mechanism, Kyber, Ntru, Openssl, Post-Quantum Cryptography, Saber, Shor's Algorithm, Tls, Authentication, Digital Devices, Factorization, Network Security, Quantum Computers, Quantum Cryptography, Seebeck Effect, Falcon, Key Encapsulation Mechanisms, Kyber, Ntru, Open Ssl, Post Quantum Cryptography, Resourceconstrained Devices, Saber, Shor's Algorithms, Tls, Electronic Document Identification Systems, key encapsulation mechanism, saber, dilithium, post-quantum cryptography, kyber, shor's algorithm, digital signature, falcon, ntru, tls, openssl

Turkish CoHE Thesis Center URL

Fields of Science

0301 basic medicine, 0303 health sciences, 03 medical and health sciences

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
3

Source

-- 7th International Conference on Computer Science and Engineering, UBMK 2022 -- Diyarbakir -- 183844

Volume

Issue

Start Page

294

End Page

299
PlumX Metrics
Citations

Scopus : 7

Captures

Mendeley Readers : 12

SCOPUS™ Citations

7

checked on Feb 04, 2026

Page Views

1

checked on Feb 04, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
2.58432538

Sustainable Development Goals

SDG data is not available