Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
<p>Types of cryptography, (<b>a</b>) symmetric cryptography, and (<b>b</b>) asymmetric cryptography.</p> "> Figure 2
<p>Key encapsulation mechanism overview.</p> "> Figure 3
<p>Key encapsulation mechanism detail.</p> "> Figure 4
<p>Workflow of the methodology for performance evaluation.</p> "> Figure 5
<p>Key generation CPU clocks on Linux.</p> "> Figure 6
<p>Key encapsulation CPU clocks on Linux.</p> "> Figure 7
<p>Key decapsulation CPU clocks on Linux.</p> "> Figure 8
<p>Key generation time (us) on Linux.</p> "> Figure 9
<p>Key encapsulation time (us) on Linux.</p> "> Figure 10
<p>Key decapsulation time (us) on Linux.</p> "> Figure 11
<p>Key generation time (us) on Windows.</p> "> Figure 12
<p>Keyencapsulation time (us) on Windows.</p> "> Figure 13
<p>Key decapsulation time (us) on Windows.</p> "> Figure 14
<p>Key generation CPU clocks on Windows.</p> "> Figure 15
<p>Key encapsulation CPU clocks on Windows.</p> "> Figure 16
<p>Key decapsulation CPU clocks on Windows.</p> "> Figure 17
<p>Comparison of results.</p> ">
Abstract
:1. Introduction
2. Related Work
- Information set decoding (ISD) attack:This attack served as the foundation for the initial assault plan against McEliece. This approach attempted to discover a small set of linearly dependent syndromes in order to retrieve the private key. It was later demonstrated, though, that, with appropriate parameter selection, this attack is not possible.
- Square root attack: This attack was introduced in the context of McEliece variants, such as the Niederreiter cryptosystem. This attack tries to recover the private key by taking advantage of the algebraic structure of the cryptosystem’s code. This attack, however, is only relevant to certain parameter selections and is not seen as being practical against versions of McEliece that have been properly configured [32].
- Meet-in-the-middle attack: This attack tries to exploit the error-correction capability of the code and the encoding process to retrieve the private key. This assault, however, needs an excessive amount of processing power and is not seen as a viable threat.
3. Proposed Methodology
- Secure communication:KEMs can be utilized to generate a shared secret key between two parties, which can then be used to encrypt and decrypt communications.
- Key exchange: KEMs can be utilized to securely exchange a secret key between two entities, thereby enabling the establishment of a secure communication channel.
- Key agreement: Multiple entities can establish a secure communication channel by using KEMs to establish a shared secret key.
- Key derivation: KEMs can be used to generate a secret key from a master key, which can then be used for cryptographic operations such as encryption and signing.
- Authentication: A client and a server can use KEMs as part of an authentication scheme to establish a shared secret key, which can then be used to authenticate the client [36]. This shared secret key can then be used to authenticate the client.
- Hybrid encryption: KEMs can be utilized to encrypt a symmetric key. A large amount of data can be encrypted using the symmetric encryption key, while the KEM key can be used to encrypt the symmetric encryption key.
- Post-quantum cryptography: KEMs are also utilized in post-quantum cryptography, which aims to protect against possible quantum computing attacks.
- Key size: the size of the KEM-generated shared secret key. In general, a smaller key size is considered to be more secure and efficient.
- Computational cost: Key generation, encapsulation, and decapsulation demand a certain amount of computational resources. In general, a lower computational cost is regarded as more efficient.
- Communication cost: The quantity of information that must be transmitted during encapsulation and decapsulation. In general, a lower communication cost is considered more efficient.
- Security: The level of security provided by the KEM is typically measured in terms of the number of required operations to compromise the system. In general, a higher level of security is considered to be more secure.
- Error rate: the frequency of errors that occur during key generation or encryption/decryption. A lower error rate is generally regarded as more trustworthy.
- Time expense: time required for the key generation, encapsulation, and decapsulation operations. In general, a lower time cost is considered more efficient.
- Comprehensive evaluation metrics: We considered a range of evaluation metrics, including key size, computational cost, security level, error rate, and time expense. This comprehensive set of metrics allows for a holistic assessment of KEM algorithms and enables researchers to understand their performance characteristics from multiple perspectives.
- Improved measurement accuracy: We incorporated optimizations in the measurement process to enhance accuracy and consistency. By leveraging the liboqs [37] library, we ensured a standardized implementation and reliable measurement results across different KEM algorithms.
- Initialization and configuration: The OQS library was initialized, and the parameters for the KEM algorithm were set. This included specifying the security level, which determined the key size and strength of security guarantees.
- Setting up the loop: A loop was set up to perform multiple iterations of the KEM algorithm, in order to obtain the average time for the performance.
- Key generation: Inside the loop, a random private key and corresponding public key were generated for the KEM algorithm being tested.
- Timing key pair generation: The time taken to generate the key pair was measured using the CPU clock. The method was run using the previously generated keys, and the resulting shared secret was discarded.
- Calculating average time for key pair generation: After the method was run for the desired number of iterations, the average time taken for the key pair generation was calculated.
- Timing KEM encapsulation: The time taken to perform the KEM encapsulation was measured using the CPU clock. The method was run using the previously generated public key and a secret message.
- Calculating average time for KEM encapsulation: After the method was run for the desired number of iterations, the average time taken for the KEM encapsulation was calculated.
- Timing KEM decapsulation: The time taken to perform the KEM decapsulation was measured using the CPU clock. The method was run using the previously generated private key and the ciphered secret message.
- Calculating average time for KEM decapsulation: After the method was run for the desired number of iterations, the average time taken for the KEM decapsulation was calculated.
- Printing relevant information: The name of the key exchange method, the security level, the average time, and the CPU clock speed were printed to the console for analysis.
Algorithm 1: Evaluation of PQC algorithms for Windows and Linux. |
4. Results
4.1. Classic McEliece
4.2. Bit-Flipping Key Encapsulation
4.3. Speed Test of KEMs
4.4. Result Comparison
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AES | Advanced Encryption Standard |
BIKE | Bit-flipping Key Encapsulation |
CCA | Chosen Ciphertext Attack |
DFA | Differential Fault Analysis |
DH | Diffie–Hellman |
DPA | Differential Power Analysis |
EC | Elliptic Curve |
ECC | Elliptic Curve Cryptography |
ECDH | Elliptic Curve Discrete Logarithm |
ECDSA | Elliptic Curve Digital Signature Algorithm |
IEEE | Institute of Electrical and Electronics Engineers |
IoT | Internet of Things |
ISD | Information Set Decoding |
KEM | Key Encapsulation Mechanism |
LWC-SP | Lightweight Cryptography Standardization Process |
NIST | National Institute of Standards and Technology |
OQS | Open Quantum Safe |
OS | Operating System |
PQ | Post-Quantum |
PQC | Post-Quantum Cryptography |
RSA | Rivest–Shamir–Adleman |
SCAs | Side-Channel Attacks |
SHA-2 | Secure Hashing Algorithm-2 |
SIG | Signatures |
TLS | Transport Layer Security |
References
- Lakshmi, P.S.; Murali, G. Comparison of classical and quantum cryptography using QKD simulator. In Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 3543–3547. [Google Scholar] [CrossRef]
- Patil, P.A.; Boda, R. Analysis of cryptography: Classical verses quantum cryptography. Int. Res. J. Eng. Technol. 2016, 3, 1372–1376. [Google Scholar]
- Roush, W. The Google-IBM Quantum Supremacy Fued. 2020. Available online: https://www.technologyreview.com/2020/02/26/905777/google-ibm-quantum-supremacy-computing-feud/ (accessed on 7 February 2023).
- Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, J.C.; Barends, R.; Biswas, R.; Boixo, S.; Brandao, F.G.; Buell, D.A.; et al. Quantum supremacy using a programmable superconducting processor. Nature 2019, 574, 505–510. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Prantl, T.; Prantl, D.; Bauer, A.; Iffländer, L.; Dmitrienko, A.; Kounev, S.; Krupitzer, C. Benchmarking of pre-and post-quantum group encryption schemes with focus on IoT. In Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA, 29–31 October 2021; pp. 1–10. [Google Scholar]
- Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In Proceedings of the 16th International Conference on emerging Networking Experiments and Technologies, Barcelona, Spain, 1–4 December 2020; pp. 149–156. [Google Scholar]
- Razaghpanah, A.; Niaki, A.A.; Vallina-Rodriguez, N.; Sundaresan, S.; Amann, J.; Gill, P. Studying TLS usage in Android apps. In Proceedings of the 13th International Conference on emerging Networking Experiments and Technologies, Incheon, Republic of Korea, 12–15 December 2017; pp. 350–362. [Google Scholar]
- Google Transparency Report—HTTPS Encryption on the Web. Available online: https://transparencyreport.google.com/https/overview (accessed on 19 January 2023).
- ANSI. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA); X9-Financial Services; American National Standards Institute: New York, NY, USA, 2005. [Google Scholar]
- ECDSA: The Digital Signature Algorithm of a Better Internet. Available online: https://blog.cloudflare.com/ecdsa-the-digital-signature-algorithm-of-a-better-internet (accessed on 19 January 2023).
- Hosoyamada, A.; Sasaki, Y. Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Cryptology ePrint Archive, Paper 2021/292. 2021. Available online: https://eprint.iacr.org/2021/292 (accessed on 25 January 2023).
- Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Post-Quantum Authentication in TLS 1.3: A Performance Study. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2020, San Diego, CA, USA, 23–26 February 2020. [Google Scholar]
- Tasopoulos, G.; Li, J.; Fournaris, A.P.; Zhao, R.K.; Sakzad, A.; Steinfeld, R. Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. In Proceedings of the ISPEC 2022: International Conference on Information Security Practice and Experience, Taipei, Taiwan, 23–25 November 2022. [Google Scholar]
- Raavi, M.; Wuthier, S.; Chandramouli, P.; Balytskyi, Y.; Zhou, X.; Chang, S.Y. Security comparisons and performance analyses of post-quantum signature algorithms. In Proceedings of the International Conference on Applied Cryptography and Network Security, Kamakura, Japan, 21–24 June 2021; Springer: Cham, Switzerland, 2021; pp. 424–447. [Google Scholar]
- Alagic, G.; Alperin-Sheriff, J.; Apon, D.; Cooper, D.; Dang, Q.; Kelsey, J.; Liu, Y.K.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce, NIST: Gaithersburg, MD, USA, 2020. [Google Scholar]
- Gidney, C.; Ekerå, M. How to factor 2048 bit RSA integers in 8 h using 20 million noisy qubits. Quantum 2021, 5, 433. [Google Scholar] [CrossRef]
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
- Merkle, R.C. A certified digital signature. In Proceedings of the CRYPTO 1989: Advances in Cryptology—CRYPTO’89 Proceedings, Houthalen, Belgium, 10–13 April 1989; Springer: New York, NY, USA, 2001; pp. 218–238. [Google Scholar]
- Ajtai, M. Generating hard instances of lattice problems. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 99–108. [Google Scholar]
- Moody, D. Let’s get ready to rumble. the nist pqc competition. In Proceedings of the First PQC Standardization Conference, Fort Lauderdale, FL, USA, 11–13 April 2018. [Google Scholar]
- Churi, J.D. Post-Quantum Encryption Benchmark. 2020. Available online: https://digitalcommons.calpoly.edu/eesp/500/ (accessed on 15 December 2022).
- Döring, R.; Geitz, M. Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. In Proceedings of the NOMS 2022–2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022; pp. 1–5. [Google Scholar]
- Strand, M. A Status Update on Quantum Safe Cryptography. In Proceedings of the 2021 International Conference on Military Communication and Information Systems (ICMCIS), The Hague, The Netherlands, 4–5 May 2021; pp. 1–7. [Google Scholar]
- Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce, NIST: Gaithersburg, MD, USA, 2022. [Google Scholar]
- Cid, C.; Gilbert, H.; Johansson, T. Cryptanalysis of Pomaranch. IEE Proc. Inf. Secur. 2006, 153, 51–53. [Google Scholar] [CrossRef] [Green Version]
- Li, W.; Liao, L.; Gu, D.; Cao, S.; Wu, Y.; Li, J.; Zhou, Z.; Guo, Z.; Liu, Y.; Liu, Z. Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 2020, 63, 139112. [Google Scholar] [CrossRef] [Green Version]
- Aghaie, A.; Kermani, M.M.; Azarderakhsh, R. Fault diagnosis schemes for secure lightweight cryptographic block cipher RECTANGLE benchmarked on FPGA. In Proceedings of the 2016 IEEE International Conference on Electronics, Circuits and Systems (ICECS), Monte Carlo, Monaco, 11–14 December 2016; pp. 768–771. [Google Scholar] [CrossRef]
- Ramezanpour, K.; Ampadu, P.; Diehl, W. A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. In Proceedings of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA, 5–10 May 2019; pp. 41–50. [Google Scholar] [CrossRef]
- Lightweight Cryptography Standardization Process: NIST Selects Ascon. Available online: https://csrc.nist.gov/News/2023/lightweight-cryptography-nist-selects-ascon (accessed on 29 May 2023).
- Dekhuijzen, L.; Liang, K.; Chen, H. A Comparison of Code-Based Cryptosystems. Available online: http://resolver.tudelft.nl/uuid:32a102cb-bb48-4f95-8a80-c687700d0443 (accessed on 20 May 2023).
- BIKE—Bit Flipping Key Encapsulation. Available online: https://bikesuite.org (accessed on 19 January 2023).
- McEliece, R.J. A Public Key Cryptosystem Based on Algebraic Coding Theory. 1978; pp. 114–116. Available online: https://ntrs.nasa.gov/api/citations/19780016269/downloads/19780016269.pdf#page=123 (accessed on 20 May 2023).
- Classic McEliece: Introduction. Available online: https://classic.mceliece.org/ (accessed on 19 January 2023).
- Benot, O. Fault Attack. In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Jajodia, S., Eds.; Springer: Boston, MA, USA, 2011; pp. 452–453. [Google Scholar] [CrossRef]
- Power Analysis. Available online: https://en.wikipedia.org/wiki/Power_analysis (accessed on 20 May 2023).
- Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. Technical Report. 2018. Available online: https://www.rfc-editor.org/rfc/rfc8446 (accessed on 12 May 2023).
- OQS Project. Liboqs. Available online: https://github.com/open-quantum-safe/liboqs (accessed on 19 January 2023).
- OQS Project. OQS OpenSSL. Available online: https://github.com/open-quantum-safe/openssl (accessed on 19 January 2023).
Key Encapsulation Algorithms | Signature Algorithms |
---|---|
Classic McEliece | CRYSTALS-Dilithium |
CRYSTALS-Kyber | Falcon |
NTRU | Rainbow |
Saber | |
BIKE | GeMSS |
HQC | SPHINCS+ |
FrodoKEM | Picnic |
NTRU Prime |
Level | Description |
---|---|
1 | At least as hard to break as AES128 |
2 | At least as hard to break as SHA256 |
3 | At least as hard to break as AES192 |
4 | At least as hard to break as SHA384 |
5 | At least as hard to break as AES256 |
Ref. | Key Exchange Algorithm | NIST Security Level | Public Key Length (Bytes) | Private Key Length (Bytes) | Cipher Text Length (Bytes) | Key Gen | Encaps | Decaps | Key Exchange Mechanism |
---|---|---|---|---|---|---|---|---|---|
[21] | NewHope | × | × | × | × | ✓ | ✓ | ✓ | × |
Kyber | × | × | × | × | ✓ | ✓ | ✓ | × | |
NTRU | × | × | × | × | ✓ | ✓ | ✓ | × | |
Frodo | × | × | × | × | ✓ | ✓ | ✓ | × | |
[6] | Kyber-512 | 1 | 800 | 1632 | 736 | ✓ | ✓ | ✓ | × |
NewHope-512-CCA | 1 | 928 | 1888 | 1120 | ✓ | ✓ | ✓ | × | |
Kyber-768 | 3 | 1184 | 2400 | 1088 | ✓ | ✓ | ✓ | × | |
NTRU-HRSS-701 | 3 | 1138 | 1450 | 1138 | ✓ | ✓ | ✓ | × | |
[22] | Kyber-512 | 1 | × | × | × | × | × | × | ✓ |
Kyber-768 | 3 | × | × | × | × | × | × | ✓ | |
Kyber-1024 | 5 | × | × | × | × | × | × | ✓ | |
HQC-128 | 1 | × | × | × | × | × | × | ✓ | |
HQC-192 | 3 | × | × | × | × | × | × | ✓ | |
HQC-256 | 5 | × | × | × | × | × | × | ✓ | |
SIDH-p434 | 1 | × | × | × | × | × | × | ✓ | |
SIDH-p610 | 3 | × | × | × | × | × | × | ✓ | |
SIDH-p751 | 5 | × | × | × | × | × | × | ✓ | |
[23] | Kyber | × | 800 | 1632 | 736 | ✓ | ✓ | ✓ | × |
NTRU | × | 930 | 1234 | 930 | ✓ | ✓ | ✓ | × | |
NTRU | × | 1138 | 1450 | 1138 | ✓ | ✓ | ✓ | × | |
Saber | × | 672 | 1568 | 736 | ✓ | ✓ | ✓ | × | |
FrodoKEM | × | 9616 | 19,888 | 9720 | ✓ | ✓ | ✓ | × | |
SIKE | × | 330 | 374 | 346 | ✓ | ✓ | ✓ | × | |
SIKE | × | 378 | 434 | 402 | ✓ | ✓ | ✓ | × | |
Kyber | × | 378 | 434 | 402 | ✓ | ✓ | ✓ | × | |
NTRU | × | 1230 | 1590 | 1230 | ✓ | ✓ | ✓ | × | |
Saber | × | 992 | 2304 | 1088 | ✓ | ✓ | ✓ | × | |
FrodoKEM | × | 15,632 | 31,296 | 15,744 | ✓ | ✓ | ✓ | × | |
NTRU Prime | × | 1158 | 1763 | 1039 | ✓ | ✓ | ✓ | × | |
NTRU Prime | × | 1039 | 1294 | 1167 | ✓ | ✓ | ✓ | × | |
SIKE | × | 462 | 524 | 486 | ✓ | ✓ | ✓ | × | |
Kyber | × | 1568 | 3068 | 1568 | ✓ | ✓ | ✓ | × | |
Saber | × | 1312 | 3040 | 1472 | ✓ | ✓ | ✓ | × | |
SIKE | × | 564 | 644 | 596 | ✓ | ✓ | ✓ | × |
Ref. | PQC Signature Algorithm | NIST Security Level | Public Key Length (Bytes) | Private Key Length (Bytes) | Signature Length (Bytes) | Sign | Verify |
---|---|---|---|---|---|---|---|
[6] | Dilithium | 2 | 1472 | 3504 | 2701 | ✓ | ✓ |
SPHINCS+ SHA256-128f | 1 | 32 | 64 | 16,976 | ✓ | ✓ | |
Dilithium | 3 | 1760 | 3856 | 3366 | ✓ | ✓ | |
SPHINCS+ SHA256-192f- | 3 | 48 | 96 | 35,664 | ✓ | ✓ | |
[22] | Falcon-512 | 1 | × | × | × | ✓ | ✓ |
Falcon-1024 | 5 | × | × | × | ✓ | ✓ | |
Rainbow-I-Classic | 1 | × | × | × | ✓ | ✓ | |
Rainbow-III-Classic | 3 | × | × | × | ✓ | ✓ | |
Rainbow-V-Classic | 5 | × | × | × | ✓ | ✓ | |
SPHINCS+-SHAKE256-128f-Robust | 1 | × | × | × | ✓ | ✓ | |
SPHINCS+-SHAKE256-192f-Robust | 3 | × | × | × | ✓ | ✓ | |
SPHINCS+-SHAKE256-256f-Robust | 5 | × | × | × | ✓ | ✓ | |
[23] | Dilithium | × | 1184 | 2800 | 2044 | × | × |
Falcon | × | 1281 | 897 | 690 | × | × | |
Falcon | × | 57,344 | 897 | 690 | × | × | |
Dilithium | × | 1472 | 3504 | 2701 | × | × | |
Dilithium | × | 1760 | 3856 | 3366 | × | × | |
Falcon | × | 1793 | 2305 | 1330 | × | × |
Key Encapsulation Algorithms | Signature Algorithms |
---|---|
CRYSTALS-Kyber | CRYSTALS-Dilithium |
Falcon | |
SPHINCS+ |
Key Encapsulation Algorithms |
---|
BIKE |
Classic McEliece |
HQC |
SIKE |
PQC KEM Algo | Public Key Length (Bytes) | Private Key Length (Bytes) | Cipher Text Length (Bytes) | Plain Text Length (Byte) | Key Exchange Mechanism |
---|---|---|---|---|---|
Classic-McEliece-348864 | 261,120 | 6542 | 128 | 32 | ✓ |
Classic-McEliece-460896 | 524,160 | 13,568 | 188 | 32 | ✓ |
Classic-McEliece-6688128 | 1,044,992 | 13,892 | 240 | 32 | ✓ |
Classic-McEliece-6960119 | 1,047,319 | 13,908 | 226 | 32 | ✓ |
Classic-McEliece-8192128 | 1,357,824 | 14,080 | 240 | 32 | ✓ |
PQC KEM Algo | Public Key Length (Bytes) | Private Key Length (Bytes) | Cipher Text Length (Bytes) | Plain Text Length (Byte) | Key Exchange Mechanism |
---|---|---|---|---|---|
BIKE-L1 | 1541 | 5223 | 1573 | 32 | ✓ |
BIKE-L3 | 3083 | 10105 | 3115 | 32 | ✓ |
PQC KEM Algorithm | Iterations | Time (us): Mean | Pop. Stdev | CPU Cycles: Mean | Pop. Stdev | OS |
---|---|---|---|---|---|---|
BIKE-L1 | ||||||
KeyGen | 23,632 | 126.95 | 30.94 | 394,828 | 96,251 | Linux |
Encaps | 170,951 | 17.55 | 1.59 | 54,534 | 4725 | |
Decaps | 8676 | 345.81 | 9.34 | 1,075,522 | 29,006 | |
BIKE-L3 | ||||||
KeyGen | 7978 | 376.07 | 4.78 | 1,169,758 | 14,807 | Linux |
Encaps | 74,536 | 39.77 | 0.68 | 123,643 | 1613 | |
Decaps | 3021 | 993.16 | 10.58 | 3,089,290 | 32,866 | |
Classic-McEliece-348864 | ||||||
KeyGen | 44 | 68,329.50 | 9172.89 | 212,555,509 | 28,534,587 | Linux |
Encaps | 299,954 | 10.002 | 11.93 | 31,053 | 37,102 | |
Decaps | 90,678 | 33.08 | 21.42 | 102,840 | 66,622 | |
KeyGen | 7 | 450,285.71 | 56,698.99 | 1,400,325,920 | 176,409,308 | Windows |
Encaps | 2427 | 1236.09 | 668.84 | 3,844,480 | 1,668,744 | |
Decaps | 3820 | 785.34 | 476.68 | 2,440,878 | 360,786 | |
Classic-McEliece-460896 | ||||||
KeyGen | 15 | 214,027.33 | 27,505.35 | 665,704,430 | 85,552,062 | Linux |
Encaps | 172,298 | 17.37 | 4.27 | 54,097 | 13,203 | |
Decaps | 36,954 | 81.18 | 4.62 | 252,414 | 14,341 | |
KeyGen | 3 | 2,017,666.67 | 847,760.32 | 6,275,358,263 | 2,634,750,115 | Windows |
Encaps | 1166 | 2574.61 | 1086.72 | 8,003,019 | 3,014,273 | |
Decaps | 1160 | 2588.79 | 1016.61 | 8,056,956 | 2,910,747 | |
Classic-McEliece-6688128 | ||||||
KeyGen | 11 | 298,843.18 | 46,922.60 | 929,623,294 | 145,963,810 | Linux |
Encaps | 97,774 | 30.68 | 4.43 | 95,344 | 13,702 | |
Decaps | 28,488 | 105.31 | 9.29 | 327,501 | 28,858 | |
KeyGen | 2 | 3,427,500.00 | 1,728,500.00 | 10,661,500,856 | 5,373,817,790 | Windows |
Encaps | 796 | 3772.61 | 655.33 | 11,734,948 | 1,170,274 | |
Decaps | 1315 | 2282.13 | 534.96 | 7,096,967 | 924,538 | |
Classic-McEliece-6960119 | ||||||
KeyGen | 10 | 313,892.00 | 71,613.75 | 976,436,744 | 222,772,222 | Linux |
Encaps | 97,540 | 30.76 | 3.46 | 95,531 | 10,685 | |
Decaps | 32,111 | 93.43 | 1.22 | 290,551 | 3477 | |
KeyGen | 2 | 1,705,500.00 | 132,500.00 | 5,302,732,432 | 411,536,683 | Windows |
Encaps | 755 | 3977.48 | 825.60 | 12,373,124 | 2,022,994 | |
Decaps | 1308 | 2294.34 | 552.78 | 7,134,395 | 1,023,687 | |
Classic-McEliece-8192128 | ||||||
KeyGen | 9 | 349,939.22 | 91,937.66 | 1,088,568,757 | 285,994,218 | Linux |
Encaps | 77,449 | 38.74 | 3.07 | 120,376 | 9427 | |
Decaps | 28,877 | 103.89 | 2.34 | 323,066 | 7162 | |
KeyGen | 1 | 3,099,000.00 | 0.00 | 9,635,977,370 | 0 | Windows |
Encaps | 342 | 8792.40 | 2934.10 | 27,344,689 | 9,001,910 | |
Decaps | 829 | 3620.02 | 1365.31 | 11,256,733 | 3,966,242 |
Algorithm | Key Generation (Linux) | Key Generation (Windows) | Encapsulation (Linux) | Decapsulation (Linux) |
---|---|---|---|---|
BIKE-L1 | 126.95 s | - | 17.55 s | 345.81 s |
BIKE-L3 | 376.07 s | - | 39.77 s | 993.16 s |
Classic-McEliece-348864 | 68.3 s | - | - | - |
Classic-McEliece-460896 | 214 s | - | - | - |
Classic-McEliece-6688128 | - | 298.8 s | - | - |
Classic-McEliece-6960119 | - | - | - | - |
Classic-McEliece-8192128 | - | - | - | - |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Farooq, S.; Altaf, A.; Iqbal, F.; Thompson, E.B.; Vargas, D.L.R.; Díez, I.d.l.T.; Ashraf, I. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. Sensors 2023, 23, 5379. https://doi.org/10.3390/s23125379
Farooq S, Altaf A, Iqbal F, Thompson EB, Vargas DLR, Díez IdlT, Ashraf I. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. Sensors. 2023; 23(12):5379. https://doi.org/10.3390/s23125379
Chicago/Turabian StyleFarooq, Sana, Ayesha Altaf, Faiza Iqbal, Ernesto Bautista Thompson, Debora Libertad Ramírez Vargas, Isabel de la Torre Díez, and Imran Ashraf. 2023. "Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms" Sensors 23, no. 12: 5379. https://doi.org/10.3390/s23125379
APA StyleFarooq, S., Altaf, A., Iqbal, F., Thompson, E. B., Vargas, D. L. R., Díez, I. d. l. T., & Ashraf, I. (2023). Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. Sensors, 23(12), 5379. https://doi.org/10.3390/s23125379