Evaluating Post-Quantum Cryptographic Algorithms on Resource-Constrained Devices
- URL: http://arxiv.org/abs/2507.08312v1
- Date: Fri, 11 Jul 2025 05:03:19 GMT
- Title: Evaluating Post-Quantum Cryptographic Algorithms on Resource-Constrained Devices
- Authors: Jesus Lopez, Viviana Cadena, Mohammad Saidur Rahman,
- Abstract summary: This paper investigates the feasibility of deploying post-quantum cryptography (PQC) algorithms on resource-constrained devices.<n>We implement three PQC algorithms -- BIKE, CRYSTALS-Kyber, and HQC -- on a lightweight IoT platform built with Raspberry Pi devices.
- Score: 1.571445233233759
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The rapid advancement of quantum computing poses a critical threat to classical cryptographic algorithms such as RSA and ECC, particularly in Internet of Things (IoT) devices, where secure communication is essential but often constrained by limited computational resources. This paper investigates the feasibility of deploying post-quantum cryptography (PQC) algorithms on resource-constrained devices. In particular, we implement three PQC algorithms -- BIKE, CRYSTALS-Kyber, and HQC -- on a lightweight IoT platform built with Raspberry Pi devices. Leveraging the Open Quantum Safe (\texttt{liboqs}) library in conjunction with \texttt{mbedTLS}, we develop quantum-secure key exchange protocols, and evaluate their performance in terms of computational overhead, memory usage, and energy consumption for quantum secure communication. Experimental results demonstrate that the integration of PQC algorithms on constrained hardware is practical, reinforcing the urgent need for quantum-resilient cryptographic frameworks in next-generation IoT devices. The implementation of this paper is available at https://iqsec-lab.github.io/PQC-IoT/.
Related papers
- Integration of quantum random number generators with post-quantum cryptography algorithms [36.136619420474766]
Post-Quantum Cryptography (PQC) has become a potential solution to prolong the life of existing Public Key Infrastructure (PKI) systems.<n>PQC protocols depend on high-quality randomness for key generation and encapsulation procedures.<n>We demonstrate a proof-of-concept enabling the incorporation of Quantum Random Number Generation (QRNG) devices within communication networks using PQC-based Transport Layer Security (TLS)
arXiv Detail & Related papers (2025-07-01T10:56:39Z) - Partial Blind Quantum Computation [0.5755004576310334]
Blind Quantum Computation (BQC) protocols enable clients with limited quantum resources to delegate computations while concealing both inputs and circuit details.<n>Applying BQC uniformly to an entire quantum circuit incurs additional quantum resources and computational overhead.<n>We propose a selective application of BQC that targets only the critical components of quantum circuits.
arXiv Detail & Related papers (2025-03-13T03:31:12Z) - Quantum-Safe integration of TLS in SDN networks [0.0]
transition to quantum-safe cryptography within the next decade is critical.<n>We have selected Transport Layer Security as the foundation to hybridize classical, quantum, and post-quantum cryptography.<n>The performance of this approach has been demonstrated using a deployed production infrastructure.
arXiv Detail & Related papers (2025-02-24T14:35:56Z) - Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems [42.184783937646806]
We investigate the potential impact of quantum computing and machine learning (QML) on cybersecurity applications of traditional ML.<n>First, we explore the potential advantages of quantum computing in machine learning problems specifically related to cybersecurity.<n>Then, we describe a methodology to quantify the future impact of fault-tolerant QML algorithms on real-world problems.
arXiv Detail & Related papers (2025-02-16T15:49:25Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum Compiling with Reinforcement Learning on a Superconducting Processor [55.135709564322624]
We develop a reinforcement learning-based quantum compiler for a superconducting processor.
We demonstrate its capability of discovering novel and hardware-amenable circuits with short lengths.
Our study exemplifies the codesign of the software with hardware for efficient quantum compilation.
arXiv Detail & Related papers (2024-06-18T01:49:48Z) - Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization [5.2804058417428275]
Post-quantum encryption and signatures can be hard to compute.
PQC may be feasible for reasonably lightweight IoT, but proposals for their optimization seem to lack standardization.
We suggest future research to seek coordination, in order to ensure an efficient and safe migration toward IoT for the post-quantum era.
arXiv Detail & Related papers (2024-01-31T01:47:04Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Simulating Noisy Quantum Circuits for Cryptographic Algorithms [0.0]
Key algorithms used in cybersecurity are vulnerable to quantum computers.
Many different quantum algorithms have been developed, which have potentially broad applications.
Software co-design refers to the concurrent design of software and hardware.
arXiv Detail & Related papers (2023-06-03T13:37:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.