The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Download
Share
Publications Copernicus
Download
Citation
Share
Articles | Volume XLVIII-4/W16-2025
https://doi.org/10.5194/isprs-archives-XLVIII-4-W16-2025-91-2025
https://doi.org/10.5194/isprs-archives-XLVIII-4-W16-2025-91-2025
19 Sep 2025
 | 19 Sep 2025

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation

Darshana Rawal, Jan Seedorf, and Nikhil Jha

Keywords: Post Quantum, Cryptography, Internet of Things(IOT), Sensor Community

Abstract. The increasing number of Internet of Things (IoT) devices requires the implementation of reliable and efficient cryptographic solutions to ensure the security of data transmission and storage. Traditional cryptographic algorithms can be challenging to implement without compromising performance or security, particularly due to the significant resource constraints faced by many IoT devices. This paper aims to evaluate the performance of classical and post-quantum cryptographic libraries on IoT hardware, specifically using the PyCryptodome Python library for traditional cryptography and the Kyber 512 algorithm for post-quantum encryption. The study assesses the security features, computational efficiency, and feasibility of these libraries in resource-constrained environments. Experiments were conducted on the Raspberry Pi 5 platform to analyze encryption and decryption performance, providing insights into the trade-offs between security and processing overhead. The findings will help identify the best cryptographic solutions for IoT devices based on their performance, security, and hardware limitations. This study includes a practical implementation of the Kyber 512 algorithm on the Raspberry Pi platform, exploring the feasibility of deploying quantum-resistant cryptography in IoT environments using Python. The research examines cryptographic performance in constrained environments by measuring encryption and decryption times scientifically. The results offer valuable insights into the computational overhead and feasibility of implementing post-quantum cryptographic solutions on limited-resource hardware. Scientific graphs were created to illustrate the complexity of encryption and decryption times, providing a visual representation of performance variations in various scenarios. Understanding these graphs clarifies the trade-offs between security and computational efficiency, which are crucial for real-world IoT applications. Furthermore, the study discusses potential optimizations and future directions that could enhance the efficiency of cryptographic operations in IoT hardware. In summary, this paper contributes to the study of cryptographic applications for IoT by investigating the viability of post-quantum cryptographic algorithms in constrained environments. By considering the findings, IoT security can be strengthened against emerging cyber threats through the selection of optimized cryptographic libraries that balance security, performance, and hardware limitations.

Share