Post-quantum ciphers (PQC) provide cryptographic algorithms for public-key ciphers which are computationally secure against the threats from quantum-computing adversaries. Because the devices in mobile computing are limited in hardware and power, we analyze the PQC power overheads. We implement the new NIST PQCs across a range of device platforms to simulate varying resource capabilities, including multiple Raspberry Pis with different memories, a laptop, and a desktop computer. We compare the power measurements with the idle cases as our baseline and show the PQCs consume considerable power. Our results show that PQC ciphers can be feasible in the resource-constrained devices (simulated with varying Raspberry Pis in our case); while PQCs consume greater power than the classical cipher of RSA for laptop and desktop, they consume comparable power for the Raspberry Pis.
CITATION STYLE
Hines, K., Raavi, M., Villeneuve, J. M., Wuthier, S., Moreno-Colin, J., Bai, Y., & Chang, S. Y. (2022). Post-Quantum Cipher Power Analysis in Lightweight Devices. In WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 282–284). Association for Computing Machinery, Inc. https://doi.org/10.1145/3507657.3529652
Mendeley helps you to discover research relevant for your work.