Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation
Keywords: Post Quantum, Cryptography, Internet of Things(IOT), Sensor Community
Abstract. The increasing number of Internet of Things (IoT) devices requires the implementation of reliable and efficient cryptographic solutions to ensure the security of data transmission and storage. Traditional cryptographic algorithms can be challenging to implement without compromising performance or security, particularly due to the significant resource constraints faced by many IoT devices. This paper aims to evaluate the performance of classical and post-quantum cryptographic libraries on IoT hardware, specifically using the PyCryptodome Python library for traditional cryptography and the Kyber 512 algorithm for post-quantum encryption. The study assesses the security features, computational efficiency, and feasibility of these libraries in resource-constrained environments. Experiments were conducted on the Raspberry Pi 5 platform to analyze encryption and decryption performance, providing insights into the trade-offs between security and processing overhead. The findings will help identify the best cryptographic solutions for IoT devices based on their performance, security, and hardware limitations. This study includes a practical implementation of the Kyber 512 algorithm on the Raspberry Pi platform, exploring the feasibility of deploying quantum-resistant cryptography in IoT environments using Python. The research examines cryptographic performance in constrained environments by measuring encryption and decryption times scientifically. The results offer valuable insights into the computational overhead and feasibility of implementing post-quantum cryptographic solutions on limited-resource hardware. Scientific graphs were created to illustrate the complexity of encryption and decryption times, providing a visual representation of performance variations in various scenarios. Understanding these graphs clarifies the trade-offs between security and computational efficiency, which are crucial for real-world IoT applications. Furthermore, the study discusses potential optimizations and future directions that could enhance the efficiency of cryptographic operations in IoT hardware. In summary, this paper contributes to the study of cryptographic applications for IoT by investigating the viability of post-quantum cryptographic algorithms in constrained environments. By considering the findings, IoT security can be strengthened against emerging cyber threats through the selection of optimized cryptographic libraries that balance security, performance, and hardware limitations.