Efficient implementation of post-quantum digital signatures on Raspberry Pi

Abstract While quantum computing poses a threat to many classical cryptographic schemes such as RSA and ECC, the quest for quantum-resistant alternatives has seen rapid growth. We provide one of the most detailed yet real-world demonstrations of the NIST-PQC lattice-based digital signature schemes,...

Full description

Saved in:
Bibliographic Details
Main Authors: Mahmood A. Al-Shareeda, Ahmed Abdul Hassan Ghadban, Ali Abdul Hadi Glass, Esam Mohamed Abdul Hadi, Mohammed Amin Almaiah
Format: Article
Language:English
Published: Springer 2025-06-01
Series:Discover Applied Sciences
Subjects:
Online Access:https://doi.org/10.1007/s42452-025-07201-z
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract While quantum computing poses a threat to many classical cryptographic schemes such as RSA and ECC, the quest for quantum-resistant alternatives has seen rapid growth. We provide one of the most detailed yet real-world demonstrations of the NIST-PQC lattice-based digital signature schemes, being the Dilithium family: Dilithium2, Dilithium3, and Dilithium5, being implemented and evaluated on a single-embedded platform, Raspberry Pi 4 Model B. We deliver a more deep-seated portrayal, giving details on platform-determined performance optimizations, performance trade-offs, and energy consumption characteristics, identifying Dilithium2 as a well-balanced prospect for quantum-safe deployments in the context of IoT and the edge. Notably, our work encompasses an empirical comparison with Dilithium and Falcon schemes with respect to implementation practicality, side-channel consideration, and resource overhead. Falcon has compact signatures, but its integration in an embedded context poses a challenge because it uses floating-point arithmetic and Gaussian sampling. Our experiments, performed on stress-tested hardware, show that Dilithium is not only as secure as required by post-quantum security standards but also operates reliably in low-resource environments. An interactive benchmarking toolkit and open-source codebase provide further reproducibility and potential for future work. We thereby give an applied basis to the practical use of quantum-secure digital signatures in constrained devices.
ISSN:3004-9261