TY - GEN
T1 - The Performance of Post-Quantum TLS 1.3
AU - Sosnowski, Markus
AU - Wiedner, Florian
AU - Hauser, Eric
AU - Steger, Lion
AU - Schoinianakis, Dimitrios
AU - Gallenmüller, Sebastian
AU - Carle, Georg
N1 - Publisher Copyright:
© 2023 ACM.
PY - 2023/12/5
Y1 - 2023/12/5
N2 - Quantum Computers (QCs) differ radically from traditional computers and can efficiently solve mathematical problems fundamental to our current cryptographic algorithms. Although existing QCs need to accommodate more qubits to break cryptographic algorithms, the concern of ''Store-Now-Decrypt-Later'' (i.e., adversaries store encrypted data today and decrypt them once powerful QCs become available) highlights the necessity to adopt quantum-safe approaches as soon as possible. In this work, we investigate the performance impact of Post-Quantum Cryptography (PQC) on TLS 1.3. Different signature algorithms and key agreements (as proposed by the National Institute of Standards and Technology (NIST)) are examined through black- and white-box measurements to get precise handshake latencies and computational costs per participating library. We emulated loss, bandwidth, and delay to analyze constrained environments. Our results reveal that HQC and Kyber are on par with our current state-of-the-art, while Dilithium and Falcon are even faster. We observed no performance drawback from using hybrid algorithms; moreover, on higher NIST security levels, PQC outperformed any algorithm in use today. Hence, we conclude that post-quantum TLS is suitable for adoption in today's systems.
AB - Quantum Computers (QCs) differ radically from traditional computers and can efficiently solve mathematical problems fundamental to our current cryptographic algorithms. Although existing QCs need to accommodate more qubits to break cryptographic algorithms, the concern of ''Store-Now-Decrypt-Later'' (i.e., adversaries store encrypted data today and decrypt them once powerful QCs become available) highlights the necessity to adopt quantum-safe approaches as soon as possible. In this work, we investigate the performance impact of Post-Quantum Cryptography (PQC) on TLS 1.3. Different signature algorithms and key agreements (as proposed by the National Institute of Standards and Technology (NIST)) are examined through black- and white-box measurements to get precise handshake latencies and computational costs per participating library. We emulated loss, bandwidth, and delay to analyze constrained environments. Our results reveal that HQC and Kyber are on par with our current state-of-the-art, while Dilithium and Falcon are even faster. We observed no performance drawback from using hybrid algorithms; moreover, on higher NIST security levels, PQC outperformed any algorithm in use today. Hence, we conclude that post-quantum TLS is suitable for adoption in today's systems.
KW - TLS
KW - performance measurements
KW - post-quantum cryptography
UR - http://www.scopus.com/inward/record.url?scp=85183580486&partnerID=8YFLogxK
U2 - 10.1145/3624354.3630585
DO - 10.1145/3624354.3630585
M3 - Conference contribution
AN - SCOPUS:85183580486
T3 - CoNEXT Companion 2023 - Companion of the 19th International Conference on emerging Networking EXperiments and Technologies
SP - 19
EP - 27
BT - CoNEXT Companion 2023 - Companion of the 19th International Conference on emerging Networking EXperiments and Technologies
PB - Association for Computing Machinery, Inc
T2 - 19th International Conference on emerging Networking EXperiments and Technologies, CoNEXT Companion 2023
Y2 - 5 December 2023 through 8 December 2023
ER -