Repository logo
 
Publication

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

dc.contributor.authorAbbasi, Maryam
dc.contributor.authorCardoso, Filipe
dc.contributor.authorVaz, Paulo
dc.contributor.authorSilva, José
dc.contributor.authorMartins, Pedro
dc.date.accessioned2025-06-03T15:39:01Z
dc.date.available2025-06-03T15:39:01Z
dc.date.issued2025-05-21
dc.description.abstractThe emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). This vulnerability has catalyzed accelerated standardization efforts for post-quantum cryptography (PQC) by the U.S. National Institute of Standards and Technology (NIST) and global security stakeholders. While theoretical security analysis of these quantum-resistant algorithms has advanced considerably, comprehensive real-world performance benchmarks spanning diverse computing environments—from high-performance cloud infrastructure to severely resource-constrained IoT devices—remain insufficient for informed deployment planning. This paper presents the most extensive cross-platform empirical evaluation to date of NIST selected PQC algorithms, including CRYSTALS-Kyber and NTRU for key encapsulation mechanisms (KEMs), alongside BIKE as a code-based alternative, and CRYSTALS-Di lithium and Falcon for digital signatures. Our systematic benchmarking framework measures computational latency, memory utilization, key sizes, and protocol overhead across multiple security levels (NIST Levels 1, 3, and 5) in three distinct hardware environments and various network conditions. Results demonstrate that contemporary server architectures can implement these algorithms with negligible performance impact (<5% additional latency), making immediate adoption feasible for cloud services. In contrast, resource-constrained devices experience more significant overhead, with computational demands varying by up to 12× between algorithms at equivalent security levels, highlighting the importance of algorithm selection for edge deployments. Beyond standalone algorithm performance, we analyze integration challenges within existing security protocols, revealing that naive implementation of PQC in TLS 1.3 can increase handshake size by up to 7× compared to classical approaches. To address this, we propose and evaluate three optimization strategies that reduce bandwidth requirements by 40–60% without compromising security guarantees. Our investigation further encompasses memory-constrained implementation techniques, side-channel resistance measures, and hybrid classical-quantum approaches for transitional deployments. Based on these comprehensive findings, we present a risk based migration framework and algorithm selection guidelines tailored to specific use cases, including financial transactions, secure firmware updates, vehicle-to-infrastructure communications, and IoT fleet management. This practical roadmap enables organizations to strategically prioritize systems for quantum-resistant upgrades based on data sensitivity, resource constraints, and technical feasibility. Our results conclusively demonstrate that PQC is deployment-ready for most applications, provided that implementations are carefully optimized for the specific performance characteristics and security requirements of target environments. We also identify several remaining research challenges for the community, including further optimization for ultra-constrained devices, standardization of hybrid schemes, and hardware acceleration opportunities.eng
dc.identifier.citationAbbasi, M., Cardoso, F., Váz, P., Silva, J., & Martins, P. (2025). A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. Cryptography, 9(2), 32. https://doi.org/10.3390/cryptography9020032
dc.identifier.doihttps://doi.org/10.3390/cryptography9020032
dc.identifier.eissn2410-387X
dc.identifier.urihttp://hdl.handle.net/10400.19/9346
dc.language.isoeng
dc.peerreviewedyes
dc.publisherMDPI
dc.relation.hasversionhttps://www.mdpi.com/2410-387X/9/2/32
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectpost-quantum cryptography
dc.subjectquantum-resistant algorithms
dc.subjectlattice-based cryptography
dc.subjectPQC performance benchmarks
dc.subjectCRYSTALS-Kyber
dc.subjectNTRU
dc.subjectBIKE
dc.subjectresourceconstrained computing
dc.subjectheterogeneous computing environments
dc.subjectTLS protocol integration
dc.subjectenergy-efficient cryptography
dc.subjectNIST standardization
dc.titleA Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environmentspor
dc.typetext
dspace.entity.typePublication
oaire.citation.issue2
oaire.citation.startPage32
oaire.citation.titleCryptography
oaire.citation.volume9
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
cryptography-09-00032.pdf
Size:
295.29 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: