{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T22:09:45Z","timestamp":1774994985462,"version":"3.50.1"},"reference-count":26,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS). As conventional key exchange mechanisms will become increasingly vulnerable in the post-quantum era, the integration of post-quantum cryptographic (PQC) algorithms into existing security protocols is of utmost importance. This study investigates the impact of incorporating PQC key encapsulation mechanisms\u2014specifically, the recent standards CRYSTALS-Kyber and HQC, in conjunction with the candidate standard BIKE\u2014into the TLS 1.3 handshake. A comprehensive experimental evaluation was conducted to measure handshake latency under emulated network conditions with varying packet loss probabilities. The findings offer useful insights into the performance trade-offs introduced by PQC integration and further highlight the necessity of a timely transition to post-quantum cryptographic standards.<\/jats:p>","DOI":"10.3390\/cryptography9040073","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:33:06Z","timestamp":1763739186000},"page":"73","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards"],"prefix":"10.3390","volume":"9","author":[{"given":"Konstantina","family":"Souvatzidaki","sequence":"first","affiliation":[{"name":"Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, 15784 Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7663-7169","authenticated-orcid":false,"given":"Konstantinos","family":"Limniotis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, 15784 Athens, Greece"},{"name":"Hellenic Data Protection Authority, Kifissias 1-3, 11523 Athens, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSEC.2024.3441764","article-title":"Analysing Cryptography in the Wild\u2014A Retrospective","volume":"22","author":"Albrecht","year":"2024","journal-title":"IEEE Secur. Priv."},{"key":"ref_2","unstructured":"National Institute of Standards and Technology, National Cybersecurity Center of Excellence (NCCoE) (2025, August 31). Migration to Post-Quantum Cryptography: Quantum Readiness\u2014Cryptographic Discovery (NIST SP 1800-38B), Preliminary Draft. NIST Special Publication (SP) 1800-38B, National Institute of Standards and Technology, Available online: https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2023-12\/pqc-migration-nist-sp-1800-38b-preliminary-draft.pdf."},{"key":"ref_3","unstructured":"European Commission (2025, August 31). Recommendation (EU) 2024\/1101 on a Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography. Available online: https:\/\/eur-lex.europa.eu\/eli\/reco\/2024\/1101\/oj."},{"key":"ref_4","unstructured":"Ivezic, M. (2025, August 31). White House\u2014Quantum Related National Security Memorandum. Available online: https:\/\/postquantum.com\/quantum-policy\/white-house-quantum-security-memo\/."},{"key":"ref_5","unstructured":"National Institute of Standards and Technology (2025, September 09). Post-Quantum Cryptography Standardization, Available online: https:\/\/csrc.nist.gov\/pqc-standardization."},{"key":"ref_6","unstructured":"Bernstein, D.J., H\u00fclsing, A.T., and Lange, T. (2022). Post-Quantum Cryptography\u2014Integration Study, European Union Agency for Cybersecurity (ENISA). Technical Report."},{"key":"ref_7","unstructured":"McKinseyI&Company (2025, August 31). What is Quantum Computing?. Available online: https:\/\/www.mckinsey.com\/featured-insights\/mckinsey-explainers\/what-is-quantum-computing."},{"key":"ref_8","unstructured":"Shor, P. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_9","unstructured":"Grover, L.K. (, January 22\u201324). A fast quantum mechanical algorithm for database search. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, New York, NY, USA. STOC \u201996."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol, Internet Engineering Task Force (IETF). Version 1.3; RFC 8446.","DOI":"10.17487\/RFC8446"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alnahawi, N., M\u00fcller, J., Oupick\u00fd, J., and Wiesmaier, A. (2024). A Comprehensive Survey on Post-Quantum TLS. IACR Commun. Cryptol., 1.","DOI":"10.62056\/ahee0iuc"},{"key":"ref_12","unstructured":"National Institute of Standards and Technology (NIST) (2025, September 10). Security (Evaluation Criteria)\u2014Post-Quantum Cryptography Standardization, Available online: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/evaluation-criteria\/security-(evaluation-criteria)."},{"key":"ref_13","unstructured":"National Institute of Standards and Technology (2025, October 03). Module-Lattice-Based Key-Encapsulation Mechanism Standard. Federal Information Processing Standards Publication 203, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final."},{"key":"ref_14","unstructured":"National Institute of Standards and Technology (2025, October 03). Round 2 Additional Digital Signature Schemes. Computer Security Resource Center, National Institute of Standards and Technology, Available online: https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/round-2-additional-signatures."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., and Miller, C. (2025, October 03). Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process, Available online: https:\/\/csrc.nist.gov\/pubs\/ir\/8545\/final.","DOI":"10.6028\/NIST.IR.8545"},{"key":"ref_16","unstructured":"Kwiatkowski, K., Sullivan, N., Langley, A., Levin, D., and Mislove, A. (2025, August 31). Measuring TLS Key Exchange with Post-Quantum KEM 2019, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Events\/Second-PQC-Standardization-Conference\/documents\/accepted-papers\/kwiatkowski-measuring-tls.pdf."},{"key":"ref_17","unstructured":"Paquin, C., Stebila, D., and Tamvada, G. (2025, August 31). Benchmarking Post-Quantum Cryptography in TLS. Cryptology ePrint Archive, Available online: https:\/\/eprint.iacr.org\/2019\/1447."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"101","DOI":"10.20517\/jsss.2022.15","article-title":"Evaluating the performance of post-quantum secure algorithms in the TLS protocol","volume":"3","author":"Tzinos","year":"2022","journal-title":"J. Surveill. Secur. Saf."},{"key":"ref_19","unstructured":"Steinbach, K., Krau\u00df, C., Niederhagen, R., and Schneider, M. (2020, January 5\u20139). Post-Quantum TLS on Embedded Systems\u2014Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., and Childs-Klein, W. (2025, August 31). The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2024\/176.","DOI":"10.14722\/madweb.2024.23010"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Su, C., Gritzalis, D., and Piuri, V. (2022). Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. Information Security Practice and Experience, Springer.","DOI":"10.1007\/978-3-031-21280-2"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"108062","DOI":"10.1016\/j.future.2025.108062","article-title":"A performance evaluation framework for post-quantum TLS","volume":"175","author":"Montenegro","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Henrich, J., Schmitt, N., Alnahawi, N., and Heinemann, A. (2026, January 20\u201322). A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?. Proceedings of the 28th International Conference (ISC 2025), Seoul, Republic of Korea.","DOI":"10.1007\/978-3-032-08124-7_6"},{"key":"ref_24","unstructured":"Open Quantum Safe Project (2025, August 31). Open Quantum Safe. Available online: https:\/\/openquantumsafe.org\/."},{"key":"ref_25","unstructured":"(2025, August 31). Open Quantum Safe Project oqs-provider: OpenSSL 3 Provider Enabling Quantum-Safe Cryptography. Open-Source Project Supporting the Transition to Quantum-Resistant Cryptography; Part of the Linux Foundation Post-Quantum Cryptography Alliance. Available online: https:\/\/github.com\/open-quantum-safe\/oqs-provider."},{"key":"ref_26","unstructured":"Souvatzidaki, K. (2025, November 10). tls_timer.py. Available online: https:\/\/github.com\/k-souvatzidaki\/post-quantum-tls\/blob\/master\/tls_timer.py."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/73\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T05:13:40Z","timestamp":1763874820000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040073"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040073","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]}}}