Research Article

Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress

Number: 2026 March 17, 2026
EN TR

Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress

Abstract

In the post-quantum era, it is predicted that secure encryption algorithms like RSA and ECC will be broken within microseconds. In response, NIST has made the transition to post-quantum cryptography necessary by completing the ML-KEM standard (FIPS 203) in August 2024. However, integrating these new algorithms into the existing TLS 1.3 infrastructure raises some concerns, particularly in resource-constrained IoT devices where computing power and memory are limited. This paper evaluates the TLS 1.3 handshake performance of ML-KEM-512, ML-KEM-768, ML-KEM-1024, and hybrid X25519+ML-KEM-768 on a Raspberry Pi 4 (ARM Cortex-A72) in five different network scenarios (loopback, LAN (10 ms RTT), WAN (50 ms RTT), and packet loss rates of 1% and 5%). Experiments were performed using OpenSSL 3.x integrated with liboqs, with 100 iterations for each configuration. The results show that ML-KEM algorithms, which have high computational costs, introduce negligible computational overhead compared to the classic X25519 under low latency conditions, and base-state 1-RTT handshake times range from 11.3 to 13.3 ms. The ML-KEM 512 algorithm showed the best performance, particularly due to its small packet size. ML-KEM reached 180 ms with 5% loss, while X25519 reached 281 ms. It was also observed that session restart times consistently reduced handshake latency for all algorithms. In algorithm tests, ML-KEM 512 provided a 4.16-fold speedup at the base level. In WAN conditions, network RTT becomes the dominant bottleneck, and the choice of KEM algorithm becomes practically irrelevant. This demonstrates that ML-KEM algorithms are a usable standard even with limited hardware and that session restart is a significant example of optimization in IoT applications.

Keywords

References

  1. Aissaoui, R., Deneuville, J.-C., Guerber, C., & Pirovano, A. (2024). A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC: Proceedings of the 21st International Conference on Security and Cryptography, 668–673. https://doi.org/10.5220/0012757800003767
  2. Asif, R. (2021). Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. IoT, 2(1), 71–91. https://doi.org/10.3390/iot2010005
  3. Aydeger, A., Hoque, S., & Zeydan, E. (2025). Challenges of DNS in the Post-Quantum Era: Improving Security with Post-Quantum TLS. Infocommunications Journal, 17(3), 11–21. https://doi.org/10.36244/ICJ.2025.3.2
  4. Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., & Stebila, D. (2019). Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. In J. Ding & R. Steinwandt (Eds.), Post-Quantum Cryptography (Vol. 11505, pp. 206–226). Springer International Publishing. https://doi.org/10.1007/978-3-030-25510-7_12
  5. Chen, J., Peng, W., Wang, Y., & Bian, Y. (2025). On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs. Entropy, 27(12), 1242. https://doi.org/10.3390/e27121242
  6. Dong, J., Hou, Y., Wang, S., Sha, L., Xiao, F., Dong, Z., & Lin, J. (n.d.). HIGH: Harnessing GPU Parallelism for Optimized HQC Performance.
  7. Gonzalez, R., & Wiggers, T. (2022). KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems. In L. Batina, S. Picek, & M. Mondal (Eds.), Security, Privacy, and Applied Cryptography Engineering (Vol. 13783, pp. 99–117). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-22829-2_6
  8. Hanna, Y., Pineda, D., Veksler, M., Paudel, M., Akkaya, K., Anastasova, M., & Azarderakhsh, R. (2024). Integrating Post-Quantum TLS into the Control Plane of 5G Networks. 2024 IEEE International Performance, Computing, and Communications Conference (IPCCC), 1–8. https://doi.org/10.1109/IPCCC59868.2024.10850437

Details

Primary Language

English

Subjects

Information Security and Cryptology, Cryptography

Journal Section

Research Article

Publication Date

March 17, 2026

Submission Date

February 27, 2026

Acceptance Date

March 16, 2026

Published in Issue

Year 2026 Number: 2026

APA
İnce, C. (2026). Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. Computer Science, 2026. https://doi.org/10.53070/bbd.1898820
AMA
1.İnce C. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 2026;(2026). doi:10.53070/bbd.1898820
Chicago
İnce, Cemile. 2026. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science, nos. 2026. https://doi.org/10.53070/bbd.1898820.
EndNote
İnce C (March 1, 2026) Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. Computer Science 2026
IEEE
[1]C. İnce, “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”, JCS, no. 2026, Mar. 2026, doi: 10.53070/bbd.1898820.
ISNAD
İnce, Cemile. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science. 2026 (March 1, 2026). https://doi.org/10.53070/bbd.1898820.
JAMA
1.İnce C. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 2026. doi:10.53070/bbd.1898820.
MLA
İnce, Cemile. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science, no. 2026, Mar. 2026, doi:10.53070/bbd.1898820.
Vancouver
1.Cemile İnce. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 2026 Mar. 1;(2026). doi:10.53070/bbd.1898820

The Creative Commons Attribution 4.0 International License 88x31.png is applied to all research papers published by JCS and

A Digital Object Identifier (DOI) Logo_TM.png is assigned for each published paper