Post-quantum cryptography (PQC) is a critical area of research aimed at addressing the threat quantum computing poses to traditional cryptographic systems. It focuses on evaluating the efficiency, security, and practical performance of PQC algorithms through experimental analysis. This research supports the development of optimized cryptographic solutions, contributes to standardization efforts, and ensures secure and efficient implementations for a wide range of applications. Despite progress in PQC, gaps still exist in practical performance evaluations, particularly in resource-constrained environments. There is a lack of standardized comparisons, hindering the selection of suitable algorithms for specific use cases like IoT and cloud systems. Furthermore, research on scalability, integration challenges, and the trade-offs between security and efficiency remains insufficient. The methodology involves creating a comprehensive framework to evaluate various PQC algorithms, including lattice-based (e.g., Kyber, Dilithium), code-based (e.g., McEliece), and hash-based (e.g., SPHINCS+). These algorithms will be tested in diverse environments, from resource-constrained devices to high-performance infrastructures such as cloud platforms. Key metrics such as encryption/decryption speed, key sizes, memory usage, and computational efficiency will be measured, focusing on the trade-offs between security, efficiency, and scalability. The results will be benchmarked against standardized metrics to provide a clear understanding of each algorithm's suitability for real-world deployment. The findings indicate that lattice-based algorithms like Kyber offer a strong balance between security and efficiency but require considerable computational resources. Code-based algorithms like McEliece are highly secure but come with large key sizes and slower speeds. Hash-based schemes like SPHINCS+ provide strong security but are computationally expensive, making them less suitable for resource-limited systems. The highlights the importance of optimizing PQC algorithms according to specific application requirements, where the choice of algorithm must balance security, efficiency, and resource constraints, with continuous optimization needed to address evolving real-world demands.
Read full abstract