Simultaneous Integration of Kyber and Dilithium on Embedded Microcontrollers: Towards Quantum-Resistant IoT Systems
Received: 24 December 2025 | Revised: 28 January 2026 and 7 February 2026 | Accepted: 8 February 2026 | Online: 4 April 2026
Corresponding author: Khanh-Linh Dinh
Abstract
The rapid progress of quantum computing poses a serious threat to conventional public-key cryptographic schemes such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), particularly in resource-constrained Internet of Things (IoT) environments. In response, Post-Quantum Cryptography (PQC) algorithms based on lattice problems—most notably Kyber for key encapsulation and Dilithium for digital signatures—have been standardized by the U.S. National Institute of Standards and Technology (NIST). While these schemes offer strong security guarantees, their practical deployment on low-power embedded microcontrollers remains challenging due to strict constraints on memory, computation time, and energy consumption. This paper presents a system-level and simultaneous integration of Kyber and Dilithium on the ESP32 microcontroller platform. To enable the concurrent execution of both NIST-standardized primitives, we apply a set of software-level optimization techniques, including Barrett reduction for efficient modular arithmetic, buffer reuse to minimize memory footprint, and careful local variable management to reduce stack usage. Unlike prior studies that typically evaluate post-quantum primitives in isolation or rely on simulated environments, our work provides an empirical evaluation based on real hardware measurements. Experimental results obtained on an ESP32 DevKit demonstrate that optimized implementations of Kyber and Dilithium can coexist reliably within the platform's limited resources, achieving practical execution times and acceptable energy consumption for embedded IoT applications. These findings provide concrete evidence that quantum-resistant public-key cryptography can be feasibly deployed on widely used microcontroller-based systems, thereby supporting the transition toward secure and future-proof IoT infrastructures.
Keywords:
Kyber, Dilithium, Post-Quantum Cryptography (PQC), ESP32, IoT, Barrett reduction, digital signature, key encapsulation, embedded systemsDownloads
References
P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134.
A. Khalid, S. McCarthy, M. O'Neill, and W. Liu, "Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?," in 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces, Otranto, Italy, 2019, pp. 194–199.
National Institute of Standards andTechnology, Module-Lattice-Based Key-Encapsulation Mechanism Standard, Federal Information Processing Standard (FIPS) 203, Aug. 13, 2024.
National Institute of Standards and Technology, Module-Lattice-Based Digital Signature Standard, Federal Information Processing Standard (FIPS) 204, Aug. 13, 2024.
M. J. Kannwischer, J. Rijneveld, P. Schwabe, and K. Stoffelen, "pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4." Cryptology ePrint Archive, 2019. [Online]. Available: https://eprint.iacr.org/2019/844.
J. Bos et al., "CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM," in 2018 IEEE European Symposium on Security and Privacy, London, UK, 2018, pp. 353–367.
T. B. Do and K. L. Dinh, "Optimizing packet size in post-quantum NB-IoT systems: Signature aggregation and Merkle tree pruning approaches," Journal of Computer Science and Cybernetics, vol. 41, no. 4, pp. 371–386, Nov. 2025.
L. Ducas et al., "CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 238–268, Feb. 2018.
Y. Zhao, C. Cui, Y. Xiao, W. Lin, and Z. Cai, "Design and Implementation of a Modular Multiplier for Public-Key Cryptosystems Based on Barrett Reduction," in The 10th International Conference on Computer Engineering and Networks, Xi'an, China, 2020, pp. 803–809.
J.-P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM," in 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, 2018, pp. 282–305.
L. Li, C. Hsu, M. Ho Au, J. Cui, L. Harn, and Z. Zhao, "Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 9629–9642, 2024.
L. Glabush, P. Longa, M. Naehrig, C. Peikert, D. Stebila, and F. Virdia, "FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism," IACR Communications in Cryptology, vol. 2, no. 3, Oct. 2025, Art. no. 25.
D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe, "The SPHINCS+ Signature Framework," in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 2019, pp. 2129–2146.
A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing," Plos One, vol. 18, no. 6, June 2023, Art. no. e0287291.
R. Avanzi et al., "CRYSTALS Kyber: Algorithm Specifications And Supporting Documentation," [Online]. Available: https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf?utm_source=chatgpt.com.
S. Bai et al., "CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation," [Online]. Available: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf?utm_source=chatgpt.com.
Downloads
How to Cite
License
Copyright (c) 2026 Thi-Bac Do, Khanh-Linh Dinh

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
