Post-Quantum Computing represents an emerging technology that can be exploited to implement robust encryption and decryption mechanisms needed for secure communication in the future Internet of Things (IoT). However, the energy and resource constraints of IoT devices imply that specific energy-efficient and lightweight algorithms need to be implemented and deployed in very resource-constrained microcontroller units (MCU). This paper examines the feasibility of implementing three post-quantum cryptography NIST algorithms in tiny IoT devices, including Saber, Falcon, and HQC. The algorithms were ported and adapted to suit the software and hardware characteristics of the most popular MCU-based devices used in academic and research settings, such as ESP32, ESP8266, and Arduino Nano 33 BLE. The results were analyzed in terms of energy consumption, time, and CPU cycles.

Power Analysis of Post-quantum Cryptography NIST Algorithms in Resource-Constrained Microcontroller

Rimoli G. P.;Fusco P.;Ficco M.
2025

Abstract

Post-Quantum Computing represents an emerging technology that can be exploited to implement robust encryption and decryption mechanisms needed for secure communication in the future Internet of Things (IoT). However, the energy and resource constraints of IoT devices imply that specific energy-efficient and lightweight algorithms need to be implemented and deployed in very resource-constrained microcontroller units (MCU). This paper examines the feasibility of implementing three post-quantum cryptography NIST algorithms in tiny IoT devices, including Saber, Falcon, and HQC. The algorithms were ported and adapted to suit the software and hardware characteristics of the most popular MCU-based devices used in academic and research settings, such as ESP32, ESP8266, and Arduino Nano 33 BLE. The results were analyzed in terms of energy consumption, time, and CPU cycles.
2025
9783031877834
9783031877841
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4920156
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact