Efficient implementation of post-quantum digital signatures on Raspberry Pi
Abstract While quantum computing poses a threat to many classical cryptographic schemes such as RSA and ECC, the quest for quantum-resistant alternatives has seen rapid growth. We provide one of the most detailed yet real-world demonstrations of the NIST-PQC lattice-based digital signature schemes,...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-06-01
|
| Series: | Discover Applied Sciences |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s42452-025-07201-z |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Abstract While quantum computing poses a threat to many classical cryptographic schemes such as RSA and ECC, the quest for quantum-resistant alternatives has seen rapid growth. We provide one of the most detailed yet real-world demonstrations of the NIST-PQC lattice-based digital signature schemes, being the Dilithium family: Dilithium2, Dilithium3, and Dilithium5, being implemented and evaluated on a single-embedded platform, Raspberry Pi 4 Model B. We deliver a more deep-seated portrayal, giving details on platform-determined performance optimizations, performance trade-offs, and energy consumption characteristics, identifying Dilithium2 as a well-balanced prospect for quantum-safe deployments in the context of IoT and the edge. Notably, our work encompasses an empirical comparison with Dilithium and Falcon schemes with respect to implementation practicality, side-channel consideration, and resource overhead. Falcon has compact signatures, but its integration in an embedded context poses a challenge because it uses floating-point arithmetic and Gaussian sampling. Our experiments, performed on stress-tested hardware, show that Dilithium is not only as secure as required by post-quantum security standards but also operates reliably in low-resource environments. An interactive benchmarking toolkit and open-source codebase provide further reproducibility and potential for future work. We thereby give an applied basis to the practical use of quantum-secure digital signatures in constrained devices. |
|---|---|
| ISSN: | 3004-9261 |