Abstract
With the advent of quantum computing, traditional encryption methods become more vulnerable to attacks that exploit their computational weaknesses. In response, NIST launched a competition for post-quantum cryptography algorithms that can withstand such attacks. One of the promising entrants is CRYSTALS-Kyber, a post-quantum cryptographic algorithm that may be secure from quantum attacks. However, the effectiveness of these algorithms has yet to be demonstrated in real-world applications. This paper presents a comparative analysis of three encryption schemes: Kyber, McEliece, and RSA (public key encryption). We evaluate these algorithms based on key parameters such as memory consumption, encryption time, decryption time, and key generation time. By comparing and contrasting these algorithms, our study aims to assess the potential utility and applicability of post-quantum cryptography in practical contexts.
Keyword
CRYSTALS-Kyber, decryption time, encryption schemes, encryption time, key generation time, Kyber, McEliece, memory consumption, NIST, post-quantum cryptography, public key encryption, quantum attacks, RSA, secure, traditional encryption, vulnerabilities
PDF Download (click here)
|