Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures
No Thumbnail Available
Date
2022
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers Inc.
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
0
OpenAIRE Views
112
Publicly Funded
No
Abstract
Towards the end of the 20. century, quantum computing came into sight by the main effect of Shor's Algorithm. While this algorithm offers a solution for the factorization problem, which makes it exponentially faster, it alongside becomes a critical threat for the encryption schemes since mostly their security mechanisms rely on the difficulty of integer factorization or discrete log problems. Despite it is not known when advanced quantum computers will show up, yet, once it is developed, most existing cryptography will be rendered useless, which means all existing information security will be vulnerable. Owing to this risky situation, The National Institute of Standards and Technology (NIST) launched post-quantum cryptography (PQC) standardization process for the development of PQC schemes. In this paper, we have chosen three key encapsulation mechanisms and two digital signature algorithms with different parameter sets from the round three submissions. We measured their TLS 1.3 handshake performance using two resource-constrained devices and compared it to that of classical encryption and digital signature schemes. Experiment results showed that post-quantum algorithms come with an extra message overhead while their handshake delay values are promising. © 2022 Elsevier B.V., All rights reserved.
Description
Keywords
Digital Signature, Dilithium, Falcon, Key Encapsulation Mechanism, Kyber, Ntru, Openssl, Post-Quantum Cryptography, Saber, Shor's Algorithm, Tls, Authentication, Digital Devices, Factorization, Network Security, Quantum Computers, Quantum Cryptography, Seebeck Effect, Falcon, Key Encapsulation Mechanisms, Kyber, Ntru, Open Ssl, Post Quantum Cryptography, Resourceconstrained Devices, Saber, Shor's Algorithms, Tls, Electronic Document Identification Systems, key encapsulation mechanism, saber, dilithium, post-quantum cryptography, kyber, shor's algorithm, digital signature, falcon, ntru, tls, openssl
Turkish CoHE Thesis Center URL
Fields of Science
0301 basic medicine, 0303 health sciences, 03 medical and health sciences
Citation
WoS Q
N/A
Scopus Q
N/A

OpenCitations Citation Count
3
Source
-- 7th International Conference on Computer Science and Engineering, UBMK 2022 -- Diyarbakir -- 183844
Volume
Issue
Start Page
294
End Page
299
Collections
PlumX Metrics
Citations
Scopus : 7
Captures
Mendeley Readers : 12
SCOPUS™ Citations
7
checked on Feb 04, 2026
Page Views
1
checked on Feb 04, 2026
Google Scholar™


