Paper 2022/1639

Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments

Alexandre Augusto Giron, Federal University of Santa Catarina (UFSC), Federal University of Technology - Parana (UTFPR)
João Pedro Adami do Nascimento, Federal University of Santa Catarina (UFSC)
Ricardo Custódio, Federal University of Santa Catarina (UFSC)
Lucas Pandolfo Perin, Technology Innovation Institute
Abstract

Adopting Post-Quantum Cryptography (PQC) in network protocols is a challenging subject. Larger PQC public keys and signatures can significantly slow the Transport Layer Security (TLS) protocol. In this context, KEMTLS is a promising approach that replaces the handshake signatures by using PQC Key Encapsulation Mechanisms (KEMs), which have, in general, smaller sizes. However, for broad PQC adoption, hybrid cryptography has its advantages over PQC-only approaches, mainly about the confidence in the security of existing cryptographic schemes. This work brings hybrid cryptography to the KEMTLS and KEMTLS-PDK protocols. We analyze different network conditions and show that the penalty when using Hybrid KEMTLS over PQC-only KEMTLS is minor under certain security levels. We also compare Hybrid KEMTLS with a hybrid version of PQTLS. Overall, the benefits of using hybrid protocols outweigh the slowdown penalties in higher security parameters, which encourages its use in practice.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Hybrid Post-Quantum Cryptography KEMTLS Network Security
Contact author(s)
alexandregiron @ utfpr edu br
joao pedro nascimento @ grad ufsc br
ricardo custodio @ ufsc br
lucas perin @ tii ae
History
2022-11-25: approved
2022-11-24: received
See all versions
Short URL
https://ia.cr/2022/1639
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1639,
      author = {Alexandre Augusto Giron and João Pedro Adami do Nascimento and Ricardo Custódio and Lucas Pandolfo Perin},
      title = {Post-Quantum Hybrid {KEMTLS} Performance in Simulated and Real Network Environments},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/1639},
      year = {2022},
      url = {https://eprint.iacr.org/2022/1639}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.