Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices

被引:2
|
作者
Tasopoulos, George [1 ]
Dimopoulos, Charis [1 ,2 ]
Fournaris, Apostolos P. [1 ]
Zhao, Raymond K. [3 ]
Sakzad, Amin [4 ]
Steinfeld, Ron [4 ]
机构
[1] RC ATHENA, Ind Syst Inst, Patras, Greece
[2] Univ Patras, Elect & Comp Engn Dpt, Patras, Greece
[3] CSIROs Data61, Sydney, NSW, Australia
[4] Monash Univ, Fac Informat Technol, Melbourne, Australia
来源
PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2023, CF 2023 | 2023年
关键词
post-quantum cryptography; energy consumption; resource-constrained systems; secure communication protocol;
D O I
10.1145/3587135.3592821
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Post-Quantum cryptography (PQC), in the past few years, constitutes the main driving force of the quantum resistance transition for security primitives, protocols and tools. TLS is one of the widely used security protocols that needs to be made quantum safe. However, PQC algorithms integration into TLS introduce various implementation overheads compared to traditional TLS that in battery powered embedded devices with constrained resources, cannot be overlooked. While there exist several works, evaluating the PQ TLS execution time overhead in embedded systems there are only a few that explore the PQ TLS energy consumption cost. In this paper, a thorough power/energy consumption evaluation and analysis of PQ TLS 1.3 on embedded systems has been made. A WolfSSL PQ TLS 1.3 custom implementation is used that integrates all the NIST PQC algorithms selected for standardisation as well as 2 out of 3 of those evaluated in NIST Round 4. Also 1 out of 2 of the BSI recommendations have been included. The PQ TLS 1.3 with the various PQC algorithms is deployed in a STM Nucleo evaluation board under a mutual and a unilateral client-server authentication scenario. The power and energy consumption collected results are analyzed in detail. The performed comparisons and overall analysis provide very interesting results indicating that the choice of the PQC algorithms in TLS 1.3 to be deployed on an embedded system may be very different depending on the device use as an authenticated or not authenticated, client or server. Also, the results indicate that in some cases, PQ TLS 1.3 implementations can be equally or more energy consumption efficient compared to traditional TLS 1.3.
引用
收藏
页码:366 / 374
页数:9
相关论文
共 50 条
  • [1] Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
    Tasopoulos, George
    Li, Jinhui
    Fournaris, Apostolos P.
    Zhao, Raymond K.
    Sakzad, Amin
    Steinfeld, Ron
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 432 - 451
  • [2] Hybrid Post-Quantum Enhanced TLS 1.3 on Embedded Devices
    Marchsreiter, Dominik
    Sepulveda, Johanna
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 905 - 912
  • [3] Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT
    Ebrahimi, Shahriar
    Bayat-Sarmadi, Siavash
    Mosanaei-Boorani, Hatameh
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 5500 - 5507
  • [4] Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices
    Shahbazi, Karim
    Ko, Seok-Bum
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 84
  • [5] Energy Consumption Awareness for Resource-Constrained Devices
    Silva, Edgar M.
    Malo, Pedro
    Albano, Michele
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 74 - 78
  • [6] Post-Quantum Authentication in TLS 1.3: A Performance Study
    Sikeridis, Dimitrios
    Kampanakis, Panos
    Devetsikiotis, Michael
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [7] Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (10): : 2047 - 2076
  • [8] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kubra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1729 - 1748
  • [9] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Kübra Seyhan
    Tu N. Nguyen
    Sedat Akleylek
    Korhan Cengiz
    Cluster Computing, 2022, 25 : 1729 - 1748
  • [10] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kübra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    Cluster Computing, 2022, 25 (03): : 1729 - 1748