Content area
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year standardization process and selected the post-quantum cryptography (PQC) public key digital signatures of Dilithium, Falcon, and SPHINCS+. Finding common ground to compare these algorithms can be difficult because of their design differences, including the fundamental math problems (lattice-based vs. hash-based). We use a visualization model to show the key/signature size vs. security trade-offs for all PQC algorithms. Our performance analyses compare the algorithms’ computational loads in the execution time. Building on the individual algorithms’ analyses, we analyze the communication costs and implementation overheads when integrated with Public Key Infrastructure (PKI) and with Transport Layer Security (TLS) and Transmission Control Protocol (TCP)/Internet Protocol (IP). Our results show that the lattice-based algorithms of Dilithium and Falcon induce lower computational overheads than the hash-based algorithms of SPHINCS+. In addition, the lattice-based PQC can outperform the classical algorithm with comparable security strength; for example, Dilithium 2 and Falcon 512 outperform RSA 4096 in the TLS handshake time duration.
Details
; Khan, Qaiser 2
; Wuthier Simeon 2
; Chandramouli Pranav 2 ; Balytskyi Yaroslav 2
; Sang-Yoon, Chang 2
1 Department of Computer Science, College of Computing and Software Engineering, Kennesaw State University, Marietta, GA 30060, USA
2 Department of Computer Science, University of Colorado Colorado Springs, Colorado Springs, CO 80918, USA; [email protected] (Q.K.); [email protected] (S.W.); [email protected] (P.C.); [email protected] (Y.B.); [email protected] (S.-Y.C.)