Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements

  • Naya Nagy*
  • , Sarah Alnemer
  • , Lama Mohammed Alshuhail
  • , Haifa Alobiad
  • , Tala Almulla*
  • , Fatima Ahmed Alrumaihi
  • , Najd Ghadra
  • , Marius Nagy
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

3 Scopus citations

Abstract

Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with unknown successful quantum vulnerabilities. This study evaluates the ML-KEM using experimental benchmarks. We implement the ML-KEM in Python for clarity and in C++ for performance, demonstrating the latter’s substantial performance improvements. The C++ implementation achieves microsecond-level execution times for key generation, encapsulation, and decapsulation. Python, while slower, provides a user-friendly introduction to the ML-KEM’s operation. Moreover, our Python benchmark confirmed that the ML-KEM consistently outperformed RSA in execution speed across all tested parameters. Beyond benchmarking, the ML-KEM is shown to handle the computational hardness of the Module Learning With Errors (MLWE) problem, ensuring resilience against quantum attacks, classical attacks, and Artificial Intelligence (AI)-based attacks, since the ML-KEM has no pattern that could be detected. To evaluate its practical feasibility on constrained devices, we also tested the C++ implementation on a Raspberry Pi 4B, representing IoT use cases. Additionally, we attempted to run integration and benchmark tests for the ML-KEM on microcontrollers such as the ESP32 DevKit, ESP32 Super Mini, ESP8266, and Raspberry Pi Pico, but these trials were unsuccessful due to memory constraints. The results showed that while the ML-KEM can operate effectively in such environments, only devices with sufficient resources and runtimes can support its computational demands. While resource-intensive, the ML-KEM offers scalable security across diverse domains such as IoT, cloud environments, and financial systems, making it a key solution for future cryptographic standards.

Original languageEnglish
Article number91
JournalSci
Volume7
Issue number3
DOIs
StatePublished - Sep 2025

Keywords

  • cryptographic benchmarking
  • key encapsulation mechanism
  • lattice-based cryptography
  • ML-KEM
  • module learning with errors (MLWE)
  • post-quantum cryptography
  • quantum resistance
  • security performance

Fingerprint

Dive into the research topics of 'Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements'. Together they form a unique fingerprint.

Cite this