Simultaneous Integration of Kyber and Dilithium on Embedded Microcontrollers: Towards Quantum-Resistant IoT Systems

Authors

Volume: 16 | Issue: 2 | Pages: 33589-33595 | April 2026 | https://doi.org/10.48084/etasr.17148

Abstract

The rapid progress of quantum computing poses a serious threat to conventional public-key cryptographic schemes such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), particularly in resource-constrained Internet of Things (IoT) environments. In response, Post-Quantum Cryptography (PQC) algorithms based on lattice problems—most notably Kyber for key encapsulation and Dilithium for digital signatures—have been standardized by the U.S. National Institute of Standards and Technology (NIST). While these schemes offer strong security guarantees, their practical deployment on low-power embedded microcontrollers remains challenging due to strict constraints on memory, computation time, and energy consumption. This paper presents a system-level and simultaneous integration of Kyber and Dilithium on the ESP32 microcontroller platform. To enable the concurrent execution of both NIST-standardized primitives, we apply a set of software-level optimization techniques, including Barrett reduction for efficient modular arithmetic, buffer reuse to minimize memory footprint, and careful local variable management to reduce stack usage. Unlike prior studies that typically evaluate post-quantum primitives in isolation or rely on simulated environments, our work provides an empirical evaluation based on real hardware measurements. Experimental results obtained on an ESP32 DevKit demonstrate that optimized implementations of Kyber and Dilithium can coexist reliably within the platform's limited resources, achieving practical execution times and acceptable energy consumption for embedded IoT applications. These findings provide concrete evidence that quantum-resistant public-key cryptography can be feasibly deployed on widely used microcontroller-based systems, thereby supporting the transition toward secure and future-proof IoT infrastructures.

Keywords:

Kyber, Dilithium, Post-Quantum Cryptography (PQC), ESP32, IoT, Barrett reduction, digital signature, key encapsulation, embedded systems

Downloads

Download data is not yet available.

References

P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134.

A. Khalid, S. McCarthy, M. O'Neill, and W. Liu, "Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?," in 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces, Otranto, Italy, 2019, pp. 194–199.

National Institute of Standards andTechnology, Module-Lattice-Based Key-Encapsulation Mechanism Standard, Federal Information Processing Standard (FIPS) 203, Aug. 13, 2024.

National Institute of Standards and Technology, Module-Lattice-Based Digital Signature Standard, Federal Information Processing Standard (FIPS) 204, Aug. 13, 2024.

M. J. Kannwischer, J. Rijneveld, P. Schwabe, and K. Stoffelen, "pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4." Cryptology ePrint Archive, 2019. [Online]. Available: https://eprint.iacr.org/2019/844.

J. Bos et al., "CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM," in 2018 IEEE European Symposium on Security and Privacy, London, UK, 2018, pp. 353–367.

T. B. Do and K. L. Dinh, "Optimizing packet size in post-quantum NB-IoT systems: Signature aggregation and Merkle tree pruning approaches," Journal of Computer Science and Cybernetics, vol. 41, no. 4, pp. 371–386, Nov. 2025.

L. Ducas et al., "CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 238–268, Feb. 2018.

Y. Zhao, C. Cui, Y. Xiao, W. Lin, and Z. Cai, "Design and Implementation of a Modular Multiplier for Public-Key Cryptosystems Based on Barrett Reduction," in The 10th International Conference on Computer Engineering and Networks, Xi'an, China, 2020, pp. 803–809.

J.-P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM," in 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, 2018, pp. 282–305.

L. Li, C. Hsu, M. Ho Au, J. Cui, L. Harn, and Z. Zhao, "Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 9629–9642, 2024.

L. Glabush, P. Longa, M. Naehrig, C. Peikert, D. Stebila, and F. Virdia, "FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism," IACR Communications in Cryptology, vol. 2, no. 3, Oct. 2025, Art. no. 25.

D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe, "The SPHINCS+ Signature Framework," in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 2019, pp. 2129–2146.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing," Plos One, vol. 18, no. 6, June 2023, Art. no. e0287291.

R. Avanzi et al., "CRYSTALS Kyber: Algorithm Specifications And Supporting Documentation," [Online]. Available: https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf?utm_source=chatgpt.com.

S. Bai et al., "CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation," [Online]. Available: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf?utm_source=chatgpt.com.

Downloads

How to Cite

[1]
T.-B. Do and K.-L. Dinh, “Simultaneous Integration of Kyber and Dilithium on Embedded Microcontrollers: Towards Quantum-Resistant IoT Systems”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 2, pp. 33589–33595, Apr. 2026.

Metrics

Abstract Views: 111
PDF Downloads: 54

Metrics Information