{"title":"评估嵌入式系统上的后量子密码学:性能分析","authors":"Ben Dong, Qian Wang","doi":"arxiv-2409.05298","DOIUrl":null,"url":null,"abstract":"The National Institute of Standards and Technology (NIST) has finalized the\nselection of post-quantum cryptographic (PQC) algorithms for use in the era of\nquantum computing. Despite their integration into TLS protocol for key\nestablishment and signature generation, there is limited study on profiling\nthese newly standardized algorithms in resource-constrained communication\nsystems. In this work, we integrate PQC into both TLS servers and clients built\nupon embedded systems. Additionally, we compare the performance overhead of PQC\npairs to currently used non-PQC schemes.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"7 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluating Post-Quantum Cryptography on Embedded Systems: A Performance Analysis\",\"authors\":\"Ben Dong, Qian Wang\",\"doi\":\"arxiv-2409.05298\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The National Institute of Standards and Technology (NIST) has finalized the\\nselection of post-quantum cryptographic (PQC) algorithms for use in the era of\\nquantum computing. Despite their integration into TLS protocol for key\\nestablishment and signature generation, there is limited study on profiling\\nthese newly standardized algorithms in resource-constrained communication\\nsystems. In this work, we integrate PQC into both TLS servers and clients built\\nupon embedded systems. Additionally, we compare the performance overhead of PQC\\npairs to currently used non-PQC schemes.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.05298\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.05298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluating Post-Quantum Cryptography on Embedded Systems: A Performance Analysis
The National Institute of Standards and Technology (NIST) has finalized the
selection of post-quantum cryptographic (PQC) algorithms for use in the era of
quantum computing. Despite their integration into TLS protocol for key
establishment and signature generation, there is limited study on profiling
these newly standardized algorithms in resource-constrained communication
systems. In this work, we integrate PQC into both TLS servers and clients built
upon embedded systems. Additionally, we compare the performance overhead of PQC
pairs to currently used non-PQC schemes.