Performance of CRYSTALS-Kyber on Raspberry Pi 5 under Embedded-System Constraints: A Comparison with RSA and EC-KEM

Authors

  • Nattapon Junlachaiworakun Department of Data Science and Information Technology, Faculty of Science, Udon Thani Rajabhat University, Udon Thani 41000, Thailand & Graduate School, Udon Thani Rajabhat University, Udon Thani 41000, Thailand
  • Nirundon Panit Faculty of Technology and Engineering, Udon Thani Rajabhat University, Udon Thani 41000, Thailand
  • Kritsanapong Somsuk Graduate School, Udon Thani Rajabhat University, Udon Thani 41000, Thailand & Faculty of Technology and Engineering, Udon Thani Rajabhat University, Udon Thani 41000, Thailand

DOI:

https://doi.org/10.59796/jcst.V16N2.2026.183

Keywords:

post-quantum cryptography, CRYSTALS-Kyber, embedded systems benchmarking, performance evaluation, key encapsulation mechanism

Abstract

The emergence of quantum computers presents a significant risk to public key cryptography algorithms, including RSA and elliptic curve cryptography (ECC). CRYSTALS-Kyber, also called Kyber, was standardized by NIST as the Module-Lattice-based-Key Encapsulation Mechanism (ML-KEM, FIPS 203) to address quantum threats. However, its performance on modern embedded ARM platforms remains uncharacterized. The aim of this study is to benchmark the Kyber family, including Kyber-512, Kyber-768, and Kyber-1024, on the Raspberry Pi 5, which is selected to represent embedded-system constraints. In addition, RSA and EC-KEM were chosen as baseline comparisons. Execution time, memory consumption (RSS), and key/ciphertext sizes were measured over 1,000 iterations using custom Python scripts (liboqs 0.14.0 and the Python cryptography library) on 64-bit Ubuntu Linux under controlled parallel execution. The results show that Kyber achieves sub-millisecond execution times (0.05-0.21 ms) for key generation, encapsulation, and decapsulation with low variability (SD < 0.02 ms). Nevertheless, RSA-2048 requires 250-264 ms per operation, while EC-KEM ranges from 0.29 ms for X25519 to 3.04 ms for secp521r1. Memory consumption is comparable across all algorithms (24-25 MB RSS). Kyber’s larger keys and ciphertexts (800-1568 bytes vs. 32-294 bytes for RSA/EC-KEM) present a latency-bandwidth trade-off for embedded deployments. Therefore, Kyber is computationally viable for latency-sensitive operations on modern ARM embedded systems. The evaluation focuses on discrete cryptographic operations, protocol-level integration and energy measurements are deferred to future work.

References

Bisheh-Niasar, M., Azarderakhsh, R., & Mozaffari-Kermani, M. (2021). Instruction-set accelerated implementation of CRYSTALS-Kyber. IEEE Transactions on Circuits and Systems I: Regular Papers, 68(11), 4648-4659. https://doi.org/10.1109/TCSI.2021.3106639

Boneh, D. (1999). Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2), 203-213.

Dong, B., & Wang, Q. (2025). Epquic: Efficient post-quantum cryptography for quic-enabled secure communication [Conference presentation]. Proceedings of the Great Lakes Symposium on VLSI 2025, New York, US. https://doi.org/10.1145/3716368.3735199

Fitzgibbon, G., & Ottaviani, C. (2024). Constrained device performance benchmarking with the implementation of post-quantum cryptography. Cryptography, 8(2), Article 21. https://doi.org/10.3390/cryptography8020021

Guo, W., Li, S., & Kong, L. (2021). An efficient implementation of KYBER. IEEE Transactions on Circuits and Systems II: Express Briefs, 69(3), 1562-1566. https://doi.org/10.1109/TCSII.2021.3103184

Hofstede, R., Jonker, M., Sperotto, A., & Pras, A. (2017). Flow-based web application brute-force attack and compromise detection. Journal of Network and Systems Management, 25(4), 735-758. https://doi.org/10.1007/s10922-017-9421-4

Huang, Y., Huang, M., Lei, Z., & Wu, J. (2020). A pure hardware implementation of CRYSTALS-KYBER PQC algorithm through resource reuse. IEICE Electronics Express, 17(17), 20200234-20200234. https://doi.org/10.1587/elex.17.20200234

Jati, A., Gupta, N., Chattopadhyay, A., & Sanadhya, S. K. (2024). A configurable crystals-kyber hardware implementation with side-channel protection. ACM Transactions on Embedded Computing Systems, 23(2), 1-25.

Jia, W., Xue, G., Wang, B., & Hu, Y. (2022). Module‐LWE‐Based key exchange protocol using error reconciliation mechanism. Security and Communication Networks, 2022(1), Article 8299232. https://doi.org/10.1155/2022/8299232

Jia, W., Zhang, J., & Wang, B. (2023). Hardness of Module‐LWE with semiuniform seeds from Module‐NTRU. IET Information Security, 2023(1), Article 2969432.

Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5

Larasati, H. T., & Kim, H. (2021). Quantum cryptanalysis landscape of shor’s algorithm for elliptic curve discrete logarithm problem [Conference presentation]. International Conference on Information Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-89432-0_8

Mighri, M. A., Benfarah, A., & Meddeb, A. (2024). Performance evaluation and benchmarking of pqc CRYSTALS-Kyber on embedded devices [Conference presentation]. 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA). IEEE, Sousse, Tunisia. https://doi.org/10.1109/AICCSA63423.2024.10912602

Miller, V. S. (1985). Use of elliptic curves in cryptography [Conference presentation]. Conference on the theory and application of cryptographic techniques. Springer Berlin Heidelberg, Berlin, Heidelberg.

Mosca, M. (2018). Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy, 16(5), 38–41. https://doi.org/10.1109/MSP.2018.3761723

Mumtaz, M., & Ping, L. (2019). Forty years of attacks on the RSA cryptosystem: A brief survey. Journal of Discrete Mathematical Sciences and Cryptography, 22(1), 9-29. https://doi.org/10.1080/09720529.2018.1564201

Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy consumption framework and analysis of Post-Quantum Key-Generation on embedded devices. Journal of Cybersecurity and Privacy, 5(3), Article 42. https://doi.org/10.3390/jcp5030042

Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. https://doi.org/10.1145/359340.359342

Sanal, P., Karagoz, E., Seo, H., Azarderakhsh, R., & Mozaffari-Kermani, M. (2021). Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. In J. García-Alfaro et al. (Eds.), Security and privacy in communication networks (LNICST, Vol. 398, pp. 424–440). Springer. https://doi.org/10.1007/978-3-030-90022-9_23

Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring [Conference presentation]. Proceedings 35th annual symposium on foundations of computer science. IEEE, Santa Fe, US. https://doi.org/10.1109/SFCS.1994.365700

Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund, M. (2018). Industrial internet of things: Challenges, opportunities, and directions. IEEE Transactions on Industrial Informatics, 14(11), 4724-4734. https://doi.org/10.1109/TII.2018.2852491

Susilo, W., Tonien, J., & Yang, G. (2021). Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Computer Standards & Interfaces, 74, Article 103470.

Van Assen, J., Kromes, R., & Erkin, Z. (2024). Auditable Medical Data Sharing through Recoverable Key Agreement [Conference presentation]. 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS). IEEE, Berlin, Germany. https://doi.org/10.1109/BRAINS63024.2024.10732363

Wiener, M. J. (1990). Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3), 553-558. https://doi.org/10.1109/18.54902

Downloads

Published

2026-03-25

How to Cite

Junlachaiworakun, N., Panit, N. ., & Somsuk, K. (2026). Performance of CRYSTALS-Kyber on Raspberry Pi 5 under Embedded-System Constraints: A Comparison with RSA and EC-KEM. Journal of Current Science and Technology, 16(2), 183. https://doi.org/10.59796/jcst.V16N2.2026.183

Issue

Section

Research Article