Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies
Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies
With the rapid advancements in quantum computing, traditional cryptographic schemes like Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC) are becoming vulnerable, necessitating the development of quantum-resistant algorithms. The National Institute of Standards and Technology (NIST) has initiated a standardization process for PQC algorithms, and several candidates, including CRYSTALS-Kyber and McEliece, have reached the final stages. This paper first provides a comprehensive analysis of the hardware complexity of post-quantum cryptography (PQC) in embedded systems, categorizing PQC algorithms into families based on their underlying mathematical problems: lattice-based, code-based, hash-based and multivariate / isogeny-based schemes. Each family presents distinct computational, memory, and energy profiles, making them suitable for different use cases. To address these challenges, this paper discusses optimization strategies such as pipelining, parallelization, and high-level synthesis (HLS), which can improve the performance and energy efficiency of PQC implementations. Finally, a detailed complexity analysis of CRYSTALS-Kyber and McEliece, comparing their key generation, encryption, and decryption processes in terms of computational complexity, has been conducted.
Wathiq Mansoor、Omar Alnaseri、Yassine Himeur、Shadi Atalla
计算技术、计算机技术
Wathiq Mansoor,Omar Alnaseri,Yassine Himeur,Shadi Atalla.Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies[EB/OL].(2025-04-18)[2025-05-22].https://arxiv.org/abs/2504.13537.点此复制
评论