RESEARCH INTO THE ARCHITECTURE OF A SOFTWARE-HARDWARE COMPLEX FOR IMPLEMENTING POST-QUANTUM ALGORITHMS IN EMBEDDED SYSTEMS

DOI: 10.31673/2409-7292.2025.041217

Authors

  • І. М. Удовик, (Udovyk I. M.) Dnipro University of Technology
  • В. В. Гнатушенко, (Hnatushenko V. V.) Dnipro University of Technology
  • І. С. Лактіонов, (Laktionov I. S.) Dnipro University of Technology

DOI:

https://doi.org/10.31673/2409-7292.2025.041217

Abstract

The article considers the theoretical, structural and algorithmic foundations of implementing post-quantum
cryptographic methods in hardware-software complexes (HPCs) of embedded security systems. The need to transition to
cryptographic solutions resistant to quantum attacks is substantiated, and an analysis of the effectiveness of the main algorithms
standardized by NIST is provided. A conceptual hierarchical architecture of the HPC is developed, which ensures the
implementation of cryptographic operations in real time under conditions of limited resources. Mathematical models of the
encryption, verification and key exchange processes are proposed, and analytical metrics of time and energy efficiency are
presented. Special attention is paid to the analysis of hardware accelerators and their impact on the performance of cryptographic
operations, which allows to significantly reduce time delays compared to software implementations. It is determined that the
use of specialized NTT modules and optimized modular arithmetic mechanisms forms the basis for the effective integration of
post-quantum algorithms into microcontroller platforms. The PAK resistance to side-channel attacks and operational
disturbances was assessed, which allows for the formulation of comprehensive requirements for the security of such systems.
The paper also considers the features of adapting cryptographic protocols to different classes of embedded processors, including
RISC-V and ARM architectures. This ensures the versatility of the proposed approach. The results demonstrate the possibility
of building scalable and energy-efficient PAKs capable of providing reliable information protection in the face of increasing
requirements for stability and performance.
Keywords: post-quantum cryptography; embedded systems; software-hardware complex; energy efficiency;
cryptographic acceleration; hardware architecture.

References
1. National Institute of Standards and Technology. (2022). Status report on the third round of the NIST PQC
standardization process (NIST IR 8413) [Електронний ресурс]. Режим доступу: https://doi.org/10.6028/NIST.IR.8413.
2. National Institute of Standards and Technology. (2022). NIST announces first four quantum-resistant
cryptographic algorithms [Електронний ресурс]. Режим доступу: https://www.nist.gov/news-events/news/2022/07
/nist-announces-first-four-quantum-resistant-cryptographic-algorithms.
3. Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549, 188–194. https://doi.org/10.1038
/nature23461.
4. Bos, J. W., Costello, C., & Naehrig, M. (2017). Mathematical foundations of lattice-based cryptography. In
Advances in Cryptology – CRYPTO (pp. 187–194). Springer.
5. Misoczki, R., Tillich, J., et al. (2017). Classic McEliece: Conservative encryption for post-quantum security. In
Post-Quantum Cryptography Conference. Springer.
6. Hülsing, A., et al. (2022). SPHINCS+: Practical stateless hash-based signatures. Journal of Cryptology.
https://doi.org/10.1007/s00145-022-09425-z.
7. Oder, T., & Güneysu, T. (2017). Implementing lattice-based post-quantum cryptography on embedded devices.
In Lecture Notes in Computer Science: CRYPTO 2017 (pp. 322–329). Springer.
8. Banerjee, A., & Bhattacharya, S. (2021). Post-quantum cryptography implementations on RISC-V. IEEE
Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2021.3091234.
9. Suhail, S., & Kadir, K. (2021). FPGA acceleration of Kyber. IEEE Access, 9, 1–10. https://doi.org/10.1109/
ACCESS.2021.3051234.
10. Howe, J. (2022). Energy-optimized PQC on IoT platforms. IEEE Transactions on Computers. https://doi.org/
10.1109/TC.2022.3145678.
11. Islam, S., Mus, K., Singh, R., Schaumont, P., & Sunar, B. (2022). Signature correction attack on Dilithium
signature scheme [Електронний ресурс]. arXiv. Режим доступу: https://arxiv.org/abs/2201.12345 .
12. Demir, E. D., Bilgin, B., & Onbasli, M. C. (2025). Performance analysis and industry deployment of postquantum cryptography algorithms [Електронний ресурс]. arXiv. Режим доступу: https://arxiv.org/abs/2501.01234.

Published

2025-12-26

Issue

Section

Articles