cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Energy Consumption of Post Quantum Cryptography: TLS 1.3 Performance

Hi All

 

Like it or not, our existing public key methods will be easily cracked by quantum computers. We must thus look to new quantum robust methods to provide our key exchange, digital signing and public key encryption methods. Thus, TLS 1.3 and above will have to migrate away from anything that uses RSA and ECC and towards quantum robust methods, such as with lattice techniques. For this, NIST recently started the standardization of Kyber for key exchange and public key encryption and for Dilithium in digital signatures. There will be others coming along behind them, though, possibly with Bike, Frodo KEM and Falcon for key exchange and Sphincs+ for digital signatures.

But, there’s a feeling that Post Quantum Cryptography (PQC) will not be as fast and be more costly for energy consumption than our existing public key methods. However, a new paper puts this fear aside and shows that the best PQC methods can beat our elliptic curve and RSA methods for a TLS 1.3 handshake.

 

https://medium.com/asecuritysite-when-bob-met-alice/energy-consumption-of-post-quantum-cryptography-...

 

Regards

 

Caute_Cautim

 

0 Replies