Katalog Plus
Bibliothek der Frankfurt UAS
Bald neuer Katalog: sichern Sie sich schon vorab Ihre persönlichen Merklisten im Nutzerkonto: Anleitung.
Dieses Ergebnis aus BASE kann Gästen nicht angezeigt werden.  Login für vollen Zugriff.

Post-Quantum KEMs for IoT: A Study of Kyber and NTRU

Title: Post-Quantum KEMs for IoT: A Study of Kyber and NTRU
Authors: M. Awais Ehsan; Walaa Alayed; Amad Ur Rehman; Waqar ul Hassan; Ahmed Zeeshan
Source: Symmetry ; Volume 17 ; Issue 6 ; Pages: 881
Publisher Information: Multidisciplinary Digital Publishing Institute
Publication Year: 2025
Collection: MDPI Open Access Publishing
Subject Terms: post-quantum cryptography; key encapsulation mechanisms; NIST; Kyber; NTRU; constrained environments; IoT security; quantum resistant cryptography; lattice-based cryptography; energy-efficient cryptographic solutions
Description: Current improvements in quantum computing present a substantial challenge to classical cryptographic systems, which typically rely on problems that can be solved in polynomial time using quantum algorithms. Consequently, post-quantum cryptography (PQC) has emerged as a promising solution to emerging quantum-based cryptographic challenges. The greatest threat is public-key cryptosystems, which are primarily responsible for key exchanges. In PQC, key encapsulation mechanisms (KEMs) are crucial for securing key exchange protocols, particularly in Internet communication, virtual private networks (VPNs), and secure messaging applications. CRYSTALS-Kyber and NTRU are two well-known PQC KEMs offering robust security in the quantum world. However, even when quantum computers are functional, they are not easily accessible. IoT devices will not be able to utilize them directly, so there will still be a requirement to protect IoT devices from quantum attacks. Concerns such as limited computational power, energy efficiency, and memory constraints in devices such as those used in IoTs, embedded systems, and smart cards limit the use of these techniques in constrained environments. These concerns always arise there. To address this issue, this study conducts a broad comparative analysis of Kyber and NTRU, with special focus on their security, performance, and implementation efficiency in such environments (IOT/constrained environments). In addition, a case study was conducted by applying KEMs to a low-power embedded device to analyze their performance in real-world scenarios. These results offer an important comparison for cyber security engineers and cryptographers who are involved in integrating post-quantum cryptography into resource-constrained devices.
Document Type: text
File Description: application/pdf
Language: English
Relation: Mathematics; https://dx.doi.org/10.3390/sym17060881
DOI: 10.3390/sym17060881
Availability: https://doi.org/10.3390/sym17060881
Rights: https://creativecommons.org/licenses/by/4.0/
Accession Number: edsbas.6AE74921
Database: BASE