Araştırma Makalesi

Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress

Sayı: 2026 17 Mart 2026
PDF İndir
EN TR

Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress

Öz

In the post-quantum era, it is predicted that secure encryption algorithms like RSA and ECC will be broken within microseconds. In response, NIST has made the transition to post-quantum cryptography necessary by completing the ML-KEM standard (FIPS 203) in August 2024. However, integrating these new algorithms into the existing TLS 1.3 infrastructure raises some concerns, particularly in resource-constrained IoT devices where computing power and memory are limited. This paper evaluates the TLS 1.3 handshake performance of ML-KEM-512, ML-KEM-768, ML-KEM-1024, and hybrid X25519+ML-KEM-768 on a Raspberry Pi 4 (ARM Cortex-A72) in five different network scenarios (loopback, LAN (10 ms RTT), WAN (50 ms RTT), and packet loss rates of 1% and 5%). Experiments were performed using OpenSSL 3.x integrated with liboqs, with 100 iterations for each configuration. The results show that ML-KEM algorithms, which have high computational costs, introduce negligible computational overhead compared to the classic X25519 under low latency conditions, and base-state 1-RTT handshake times range from 11.3 to 13.3 ms. The ML-KEM 512 algorithm showed the best performance, particularly due to its small packet size. ML-KEM reached 180 ms with 5% loss, while X25519 reached 281 ms. It was also observed that session restart times consistently reduced handshake latency for all algorithms. In algorithm tests, ML-KEM 512 provided a 4.16-fold speedup at the base level. In WAN conditions, network RTT becomes the dominant bottleneck, and the choice of KEM algorithm becomes practically irrelevant. This demonstrates that ML-KEM algorithms are a usable standard even with limited hardware and that session restart is a significant example of optimization in IoT applications.

Anahtar Kelimeler

Kaynakça

  1. Aissaoui, R., Deneuville, J.-C., Guerber, C., & Pirovano, A. (2024). A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC: Proceedings of the 21st International Conference on Security and Cryptography, 668–673. https://doi.org/10.5220/0012757800003767
  2. Asif, R. (2021). Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. IoT, 2(1), 71–91. https://doi.org/10.3390/iot2010005
  3. Aydeger, A., Hoque, S., & Zeydan, E. (2025). Challenges of DNS in the Post-Quantum Era: Improving Security with Post-Quantum TLS. Infocommunications Journal, 17(3), 11–21. https://doi.org/10.36244/ICJ.2025.3.2
  4. Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., & Stebila, D. (2019). Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. In J. Ding & R. Steinwandt (Eds.), Post-Quantum Cryptography (Vol. 11505, pp. 206–226). Springer International Publishing. https://doi.org/10.1007/978-3-030-25510-7_12
  5. Chen, J., Peng, W., Wang, Y., & Bian, Y. (2025). On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs. Entropy, 27(12), 1242. https://doi.org/10.3390/e27121242
  6. Dong, J., Hou, Y., Wang, S., Sha, L., Xiao, F., Dong, Z., & Lin, J. (n.d.). HIGH: Harnessing GPU Parallelism for Optimized HQC Performance.
  7. Gonzalez, R., & Wiggers, T. (2022). KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems. In L. Batina, S. Picek, & M. Mondal (Eds.), Security, Privacy, and Applied Cryptography Engineering (Vol. 13783, pp. 99–117). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-22829-2_6
  8. Hanna, Y., Pineda, D., Veksler, M., Paudel, M., Akkaya, K., Anastasova, M., & Azarderakhsh, R. (2024). Integrating Post-Quantum TLS into the Control Plane of 5G Networks. 2024 IEEE International Performance, Computing, and Communications Conference (IPCCC), 1–8. https://doi.org/10.1109/IPCCC59868.2024.10850437

Ayrıntılar

Birincil Dil

İngilizce

Konular

Bilgi Güvenliği ve Kriptoloji, Kriptografi

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

17 Mart 2026

Gönderilme Tarihi

27 Şubat 2026

Kabul Tarihi

16 Mart 2026

Yayımlandığı Sayı

Yıl 2026 Sayı: 2026

Kaynak Göster

APA
İnce, C. (2026). Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. Computer Science, 2026. https://doi.org/10.53070/bbd.1898820
AMA
1.İnce C. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 2026;(2026). doi:10.53070/bbd.1898820
Chicago
İnce, Cemile. 2026. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science, sy 2026. https://doi.org/10.53070/bbd.1898820.
EndNote
İnce C (01 Mart 2026) Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. Computer Science 2026
IEEE
[1]C. İnce, “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”, JCS, sy 2026, Mar. 2026, doi: 10.53070/bbd.1898820.
ISNAD
İnce, Cemile. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science. 2026 (01 Mart 2026). https://doi.org/10.53070/bbd.1898820.
JAMA
1.İnce C. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 2026. doi:10.53070/bbd.1898820.
MLA
İnce, Cemile. “Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress”. Computer Science, sy 2026, Mart 2026, doi:10.53070/bbd.1898820.
Vancouver
1.Cemile İnce. Hybrid ML-KEM in TLS 1.3: Performance Analysis on ARM64 Under Network Stress. JCS. 01 Mart 2026;(2026). doi:10.53070/bbd.1898820

The Creative Commons Attribution 4.0 International License 88x31.png  is applied to all research papers published by JCS and

a Digital Object Identifier (DOI)     Logo_TM.png  is assigned for each published paper.