Performance Analysis and Industry Deployment of Post-Quantum Cryptography Algorithms
By: Elif Dicle Demir, Buse Bilgin, Mehmet Cengiz Onbasli
Potential Business Impact:
Makes internet messages safe from future supercomputers.
As quantum computing advances, modern cryptographic standards face an existential threat, necessitating a transition to post-quantum cryptography (PQC). The National Institute of Standards and Technology (NIST) has selected CRYSTALS-Kyber and CRYSTALS-Dilithium as standardized PQC algorithms for secure key exchange and digital signatures, respectively. This study conducts a comprehensive performance analysis of these algorithms by benchmarking execution times across cryptographic operations such as key generation, encapsulation, decapsulation, signing, and verification. Additionally, the impact of AVX2 optimizations is evaluated to assess hardware acceleration benefits. Our findings demonstrate that Kyber and Dilithium achieve efficient execution times, outperforming classical cryptographic schemes such as RSA and ECDSA at equivalent security levels. Beyond technical performance, the real-world deployment of PQC introduces challenges in telecommunications networks, where large-scale infrastructure upgrades, interoperability with legacy systems, and regulatory constraints must be addressed. This paper examines the feasibility of PQC adoption in telecom environments, highlighting key transition challenges, security risks, and implementation strategies. Through industry case studies, we illustrate how telecom operators are integrating PQC into 5G authentication, subscriber identity protection, and secure communications. Our analysis provides insights into the computational trade-offs, deployment considerations, and standardization efforts shaping the future of quantum-safe cryptographic infrastructure.
Similar Papers
Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics
Cryptography and Security
Makes phones and gadgets safe from future computer hacks.
Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies
Cryptography and Security
Makes computer codes safe from future quantum computers.
Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains
Cryptography and Security
Secures online money from future super-computers.