Pure Hardware Implementation of CRYSTALS-KYBER for Post-Quantum Cryptography
This paper presents a resource-efficient hardware implementation of the CRYSTALS-KYBER post-quantum cryptography algorithm, focusing on optimizing resource reuse.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Title: A Pure Hardware Implementation of CRYSTALS-KYBER PQC Algorithm through Resource Reuse
-------------------------------------------------------------------------------------------------------------------------
Implementation Plan:
---------------------------
Step 1: Initially , we load and collect data from "Cryptographic Algorithm Classification" Dataset.
Step 2: Then, we generate CRYSTALS-KYBER public and private key pairs using PyKyber based on dataset keys.
Step 3: Then, we encrypt the data with encrypted ciphertext using Kyber encryption technique.
Step 4: Next, we decrypt the encrypted ciphertext using the private key to recover the original plaintext.
Step 5: Next, we Validate the data correctness by comparing the decrypted message with the original plaintext.
Step 6: Next, we Measure the execution time and computational efficiency for different security levels (Kyber-512, Kyber-768, Kyber-1024).
Step 7: Next, we analyze encryption/decryption patterns to optimize the Kyber parameters.
Step 8: Finally, we plot graph for the following metrics:
8.1: Number of Data vs. Encryption Time (ms)
8.2: Number of Data vs. Decryption Time (ms)
8.3: Number of Data vs. Key Generation Time (ms)
Software Requirements:
-----------------------------
1. Development Tool: Python 3.11.4 or above
2. Operating System: Windows-10(64-bit) or above
Dataset :
-----------
Link : https://www.kaggle.com/datasets/chaitanya205/cryptographic-algorithm-classification-dataset
Note :-
---------
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) If the plan satisfies your requirement, Please confirm with us.
4) Project based on Simulation only, not a real time project.
5) Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.
-----------------------------------------------------------------------------------------------
1. #PostQuantumCryptography
2. #QuantumSecurity
3. #CryptoInnovation
4. #BlockchainTechnology
5. #Cybersecurity
6. #Cryptography
7. #TechForGood
8. #FutureOfSecurity
9. #DigitalTrust
10. #CRYSTALSKyber
------------------------------------------------------------------------------------------
We are pleased to assist you in finding a solution to your study
regarding MATLAB simulation. We hope that this resource will prove helpful in addressing your
concerns.
You will get One point solution for all your ,
MATLAB RESEARCH | ASSIGNMNETS | PROGRAMS | SIMULINK | HOMEWORK | THESIS.
For further enquiry contact us:
visit us at: https://matlabsimulation.com
Mail us at: matlabguide@gmail.com
contact us at: +91 9444856435
Video Information
Views
192
Total views since publication
Likes
3
User likes and reactions
Duration
8:17
Video length
Published
Apr 12, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#PostQuantumCryptography #QuantumSecurity #CryptoInnovation #BlockchainTechnology #Cybersecurity #Cryptography #TechForGood #FutureOfSecurity #DigitalTrust #CRYSTALSKyber
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.