Benchmarking Post-Quantum Cryptography

Are you ready for some benchmarking fun? Let’s talk about post-quantum cryptography (PQC) the future of encryption that can withstand attacks from quantum computers. But before we dive into this exciting topic, let me warn you: it’s not as easy as pie to measure PQC performance accurately. In fact, it’s like trying to time a cheetah running in slow motion while wearing a blindfold and holding a stopwatch with your feet!

But don’t be scared, my friend we have some tricks up our sleeves that can help us navigate this treacherous terrain. First, let’s define what benchmarking means in the context of PQC: it involves measuring the performance (e.g., speed and resource consumption) of different algorithms under various conditions to determine which one is best suited for a given application.

Now that we have that out of the way, some common pitfalls when benchmarking PQC. One major issue is the lack of standardization in this field there are no universally accepted benchmarks or testing methodologies yet. This means that different researchers and vendors may use different metrics to measure performance, which can lead to confusion and inconsistencies.

Another challenge is the fact that PQC algorithms often have complex parameters (e.g., key lengths) that affect their performance significantly. For example, a longer key length generally provides better security but also increases resource consumption. This means that we need to be careful when comparing different algorithms we must ensure that they are tested under comparable conditions and with similar parameter settings.

To address these issues, the National Institute of Standards and Technology (NIST) has launched a standardization process for PQC called “Post-Quantum Cryptography Standardization: A Roadmap” in 2016. This roadmap outlines a series of steps that NIST will take to select one or more new cryptographic algorithms that can withstand quantum attacks. As part of this process, NIST has also released several draft documents and called for public comments on them.

In terms of benchmarking methodologies, there are some best practices we should follow:
– Use a standardized testing framework (e.g., OpenSSL or Bouncy Castle) to ensure consistency across different platforms and environments.
– Test multiple iterations of each algorithm with varying parameter settings to get an accurate picture of their performance.
– Measure resource consumption (e.g., CPU cycles, memory usage) as well as speed to provide a more complete view of the algorithms’ efficiency.
– Use realistic data sets and scenarios to ensure that the benchmarks are relevant to real-world applications.

Now some specific PQC algorithms and their performance characteristics. One popular algorithm is Lattice-Based Cryptography (LBC), which uses mathematical lattices as a basis for encryption. According to recent benchmarking results, the NTRU algorithm (a variant of LBC) can provide 128 bits of security with an average key generation time of around 3 seconds on a modern CPU. However, this performance comes at a cost NTRU requires significantly more resources than traditional symmetric encryption algorithms like AES or Serpent.

Another PQC algorithm is Code-Based Cryptography (CBC), which uses error-correcting codes as the basis for encryption. According to recent benchmarking results, the McEliece algorithm (a variant of CBC) can provide 128 bits of security with an average key generation time of around 5 seconds on a modern CPU. However, this performance also comes at a cost McEliece requires significantly more resources than traditional symmetric encryption algorithms like AES or Serpent.

Finally, some emerging PQC technologies that show promise for the future. One such technology is Supersingular Isogeny Cryptography (SIS), which uses algebraic curves to provide secure communication. According to recent benchmarking results, SIS can provide 128 bits of security with an average key generation time of around 3 seconds on a modern CPU. However, this performance also comes at a cost SIS requires significantly more resources than traditional symmetric encryption algorithms like AES or Serpent.

SICORPS