dc.contributor.author | Saribas, Sultan | |
dc.contributor.author | Tonyali, Samet | |
dc.date.accessioned | 2024-05-22T12:56:07Z | |
dc.date.available | 2024-05-22T12:56:07Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.isbn | 978-166547010-0 | |
dc.identifier.uri | https://doi.org/10.1109/UBMK55850.2022.9919545 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12573/2142 | |
dc.description.abstract | Towards the end of the 20. century, quantum computing came into sight by the main effect of Shor's Algorithm. While this algorithm offers a solution for the factorization problem, which makes it exponentially faster, it alongside becomes a critical threat for the encryption schemes since mostly their security mechanisms rely on the difficulty of integer factorization or discrete log problems. Despite it is not known when advanced quantum computers will show up, yet, once it is developed, most existing cryptography will be rendered useless, which means all existing information security will be vulnerable. Owing to this risky situation, The National Institute of Standards and Technology (NIST) launched post-quantum cryptography (PQC) standardization process for the development of PQC schemes. In this paper, we have chosen three key encapsulation mechanisms and two digital signature algorithms with different parameter sets from the round three submissions. We measured their TLS 1.3 handshake performance using two resource-constrained devices and compared it to that of classical encryption and digital signature schemes. Experiment results showed that post-quantum algorithms come with an extra message overhead while their handshake delay values are promising. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.isversionof | 10.1109/UBMK55850.2022.9919545 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | post-quantum cryptography | en_US |
dc.subject | shor’s algorithm | en_US |
dc.subject | key encapsulation mechanism | en_US |
dc.subject | digital signature | en_US |
dc.subject | openssl, tls | en_US |
dc.subject | kyber, ntru | en_US |
dc.subject | saber | en_US |
dc.subject | dilithium | en_US |
dc.subject | falcon | en_US |
dc.title | Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures | en_US |
dc.type | conferenceObject | en_US |
dc.contributor.department | AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.contributor.institutionauthor | Saribas, Sultan | |
dc.identifier.startpage | 1 | en_US |
dc.identifier.endpage | 6 | en_US |
dc.relation.journal | Proceedings - 7th International Conference on Computer Science and Engineering, UBMK 2022 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |