Constraints in IoT networks and devices
IoT devices are likely to use cloud-based services, acting as they do, remotely and in potentially constrained environments, and consequently, TLS is often the protocol that connects them. Some typical constraints with IoT devices are memory, flash storage, and CPU cycles. To remain protected, the cryptographic algorithms used by TLS really matter, and there is a fine balance required to preserve efficiency of resources, and maintain the security of those devices against the quantum threat. For example, PQC algorithms typically consume far more memory and code-size than their classical counterparts.
Quantum-safe TLS with PQCryptoLib-Embedded
PQCryptoLib-Embedded contains efficient, low-footprint implementations of ML-DSA and ML-KEM. It’s also been designed for seamless integration into a variety of operating systems, including Linux, real time OS, or into bare metal. It comprises all the power of PQShield’s cryptographic library but in a way that can efficiently drive resource-constrained devices to establish a quantum-safe TLS communication.