dc.contributor.author | Saribas, Sultan | |
dc.contributor.author | Tonyali, Samet | |
dc.date.accessioned | 2023-02-03T07:43:34Z | |
dc.date.available | 2023-02-03T07:43:34Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.citation | S. Sarıbaş and S. Tonyalı, "Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures," 2022 7th International Conference on Computer Science and Engineering (UBMK), Diyarbakir, Turkey, 2022, pp. 294-299, doi: 10.1109/UBMK55850.2022.9919545. | en_US |
dc.identifier.uri | https://ieeexplore.ieee.org/document/9919545 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12440/5749 | |
dc.description.abstract | Towards the end of the 20. century, quantum computing came into sight by the main effect of Shor's Algorithm. While this algorithm offers a solution for the factorization problem, which makes it exponentially faster, it alongside becomes a critical threat for the encryption schemes since mostly their security mechanisms rely on the difficulty of integer factorization or discrete log problems. Despite it is not known when advanced quantum computers will show up, yet, once it is developed, most existing cryptography will be rendered useless, which means all existing information security will be vulnerable. Owing to this risky situation, The National Institute of Standards and Technology (NIST) launched post-quantum cryptography (PQC) standardization process for the development of PQC schemes. In this paper, we have chosen three key encapsulation mechanisms and two digital signature algorithms with different parameter sets from the round three submissions. We measured their TLS 1.3 handshake performance using two resource-constrained devices and compared it to that of classical encryption and digital signature schemes. Experiment results showed that post-quantum algorithms come with an extra message overhead while their handshake delay values are promising. © 2022 IEEE. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc | en_US |
dc.relation.ispartof | Proceedings - 7th International Conference on Computer Science and Engineering, UBMK 2022 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | digital signature | en_US |
dc.subject | dilithium | en_US |
dc.subject | falcon | en_US |
dc.subject | key encapsulation mechanism | en_US |
dc.subject | kyber | en_US |
dc.subject | ntru | en_US |
dc.subject | openssl | en_US |
dc.subject | post-quantum cryptography | en_US |
dc.subject | saber | en_US |
dc.subject | shor's algorithm | en_US |
dc.subject | tls | en_US |
dc.title | Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures | en_US |
dc.type | conferenceObject | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.department | Fakülteler, Mühendislik ve Doğa Bilimleri Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.authorid | 0000-0001-7799-2771 | en_US |
dc.identifier.startpage | 294 | en_US |
dc.contributor.institutionauthor | Tonyalı, Samet | |
dc.identifier.doi | 10.1109/UBMK55850.2022.9919545 | en_US |
dc.identifier.endpage | 299 | en_US |
dc.authorwosid | AAH-5922-2019 | en_US |
dc.authorscopusid | 56499412600 | en_US |