A Hybrid Post-Quantum Cryptographic Framework Integrating Kyber-512 and ASCON for Secure IoT Communications

Authors

  • Liyth H. Mahdi College of Information Technology, Department of Information Networks, University of Babylon, Babil, Iraq
  • Alharith A. Abdullah College of Information Technology, Department of Information Networks, University of Babylon, Babil, Iraq
Volume: 15 | Issue: 5 | Pages: 26527-26533 | October 2025 | https://doi.org/10.48084/etasr.12471

Abstract

The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity. Existing cryptographic solutions are not capable of achieving lightweight performance and resilience against upcoming cyberattacks, especially with the use of quantum computing. This article presents a hybrid cryptographic framework that combines Kyber-512, a post-quantum key encapsulation method, with ASCON, a lightweight authenticated encryption method, to improve IoT security. The proposed method includes key generation, encryption, secure data transmission, decryption with minimal computational load, and the ability to exhibit good security attributes. Performance analysis through extensive experimentation reveals that the proposed framework is efficient in terms of encryption time (43 ms), has minimal memory usage (2.56 KB), and provides optimal CPU usage (21.62%) and power savings (20.76 W), while ensuring high ciphertext entropy (7.90). The experimental results further indicate that the lightweight nature of ASCON allows for rapid encryption and decryption with little effect on system performance. The incorporation of Kyber-512 offers post-quantum security, reducing the threat of quantum-based attacks while being practically usable for devices with resource constraints. The proposed hybrid method meets security and efficiency requirements and is highly appropriate for use in IoT networks and similar embedded systems where computational resources and power savings are important considerations. This research highlights the importance of combining post-quantum cryptography with lightweight ciphers to strengthen the security posture in future-connected systems.

Keywords:

lightweight cryptography, Kyber-512, ASCON, IOT security, resource-constrained devices

Downloads

Download data is not yet available.

References

G. Cagua, V. Gauthier-Umaña, and C. Lozano-Garzon, "Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices," IEEE Access, vol. 13, pp. 16671–16682, 2025.

K. Seyhan, T. N. Nguyen, S. Akleylek, and K. Cengiz, "Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey," Cluster Computing, vol. 25, no. 3, pp. 1729–1748, Jun. 2022.

F. Opiłka, M. Niemiec, M. Gagliardi, and M. A. Kourtis, "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature," Applied Sciences, vol. 14, no. 12, Jun. 2024, Art. no. 4994.

J. Manyika et al., "The internet of things: mapping the value beyond the hype," McKinsey Global Institute, Report, Jun. 2015.

A. Ali, M. A. H. Farquad, C. Atheeq, and C. Altaf, "A Quantum Encryption Algorithm based on the Rail Fence Mechanism to Provide Data Integrity," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18818–18823, Dec. 2024.

S. Li et al., "Post-Quantum Security: Opportunities and Challenges," Sensors, vol. 23, no. 21, Oct. 2023, Art. no. 8744.

C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, Ascon v1.2. Submission to the CAESAR Competition. 2016.

Y. C. Chen and W. C. Ku, "A Security Improved IoT Authentication Protocol Based on Ascon Lightweight Cryptographic Algorithms," in 2024 10th International Conference on Applied System Innovation (ICASI), Kyoto, Japan, Apr. 2024, pp. 229–231.

V. Voloshyn, M. S. Khan, G. Srivastava, and D. M, "Analysis of NIST Lightweight Cryptographic Algorithms Performance in IoT Security Environments based on MQTT," in 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, Apr. 2024, pp. 1–6.

H. P. Nguyen and Y. Chen, "Lightweight, Post-Quantum Secure Cryptography Based on Ascon: Hardware Implementation in Automotive Applications," Electronics, vol. 13, no. 22, Nov. 2024, Art. no. 4550.

K. D. Nguyen, T. K. Dang, B. Kieu-Do-Nguyen, D. H. Le, C. K. Pham, and T. T. Hoang, “ASIC Implementation of ASCON Lightweight Cryptography for IoT Applications,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 72, no. 1, pp. 278–282, Jan. 2025.

S. A. Hussein and A. A. Abdullah, "Hybrid routing protocol for quantum network based on classical and quantum routing metrics," Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 1, Jul. 2023, Art. no. 197.

National Institute of Standards and Technology (US), "Module-lattice-based key-encapsulation mechanism standard," National Institute of Standards and Technology, Washington, DC, USA, Aug. 2024.

S. Liu and A. Sakzad, "CRYSTALS-Kyber With Lattice Quantizer." arXiv, Jan. 28, 2024.

National Institute of Standards and Technology (US), "Module-lattice-based digital signature standard," National Institute of Standards and Technology, Washington, D.C., Aug. 2024.

S. He, H. Li, F. Li, and R. Ma, "A lightweight hardware implementation of CRYSTALS-Kyber," Journal of Information and Intelligence, vol. 2, no. 2, pp. 167–176, Mar. 2024.

C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, "Ascon v1.2: Lightweight Authenticated Encryption and Hashing," Journal of Cryptology, vol. 34, no. 3, Jul. 2021.

M. El-Hadedy et al., "RECO-ASCON: Reconfigurable ASCON hash functions for IoT applications," Integration, vol. 93, Nov. 2023, Art. no. 102061.

A. Magyari and Y. Chen, "Securing the Internet of Things with Ascon-Sign," Internet of Things, vol. 28, Dec. 2024, Art. no. 101394.

S. Khan et al., "Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher," International Journal of Information Security, vol. 23, no. 6, pp. 3653–3664, Dec. 2024.

Downloads

How to Cite

[1]
L. H. Mahdi and A. A. Abdullah, “A Hybrid Post-Quantum Cryptographic Framework Integrating Kyber-512 and ASCON for Secure IoT Communications”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 26527–26533, Oct. 2025.

Metrics

Abstract Views: 158
PDF Downloads: 59

Metrics Information