Post-Quantum Entropy as a Service for Embedded Systems

📅 2026-03-10
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of limited entropy quality and high overhead of secure protocols on embedded devices by proposing a Quantum Entropy as a Service (QEaaS) system. It presents the first efficient post-quantum entropy distribution architecture deployed on resource-constrained platforms such as the ESP32, leveraging ML-KEM-512 and ML-DSA-44 to establish a post-quantum secure DTLS 1.3 channel. The system injects Quantis quantum random numbers into a Zephyr-compatible CoAP stack and integrates a BLAKE2s-based entropy pool alongside a custom OpenSSL entropy provider. Experimental results demonstrate that a full post-quantum DTLS handshake completes in just 225 ms—63% faster than the classical ECDHE+ECDSA counterpart—while local entropy operations incur less than 0.1 ms of latency.

Technology Category

Application Category

📝 Abstract
Embedded cryptography stands or falls on entropy quality, yet small devices have few trustworthy sources and little tolerance for heavyweight protocols. We build a Quantum Entropy as a Service (QEaaS) system that moves QRNG-derived entropy from a Quantis device to ESP32-class clients over post-quantum-secured channels. On the server side, the design exposes two paths: direct quantum entropy through a custom OpenSSL provider and mixed entropy through the Linux system pool. On the client side, we extend libcoap's Zephyr support, integrate wolfSSL-based DTLS 1.3 into the CoAP stack, and add a BLAKE2s entropy pool that preserves the standard Zephyr extraction interface while introducing an injection API for server-provided entropy. Benchmarks on ESP32 hardware, targeting 100 iterations per configuration, show that ML-KEM-512 completes a DTLS 1.3 handshake in 313 ms on average without certificate verification, 35% faster than ECDHE P-256. Pairing ML-KEM-512 with ML-DSA-44 lowers the mean to 225 ms. Certificate verification adds roughly 194 ms for ECDSA but only 17 ms for ML-DSA-44, so the fully post-quantum configuration remains 63% faster than classical ECDHE P-256 with ECDSA even under full verification. Local BLAKE2s pool operations stay below 0.1 ms combined. On this platform, post-quantum key exchange and authentication are not only feasible; they are faster than the classical baseline.
Problem

Research questions and friction points this paper is trying to address.

embedded systems
entropy quality
post-quantum cryptography
QRNG
lightweight protocols
Innovation

Methods, ideas, or system contributions that make the work stand out.

Post-Quantum Cryptography
Quantum Random Number Generation
Embedded Systems
DTLS 1.3
Entropy as a Service
🔎 Similar Papers
No similar papers found.
Javier Blanco-Romero
Javier Blanco-Romero
Telematics Engineering Department, Universidad Carlos III de Madrid
CryptographyRoboticsQuantum Mechanics
Y
Yuri Melissa Garcia-Niño
Universidad Carlos III de Madrid, Av. de la Universidad, 30, 28911 Leganés, Madrid, Spain; Universidad Industrial de Santander, Bucaramanga, Santander, Colombia
F
Florina Almenares Mendoza
Department of Telematic Engineering, Universidad Carlos III de Madrid, Leganés, Madrid, Spain
D
Daniel Díaz-Sánchez
Department of Telematic Engineering, Universidad Carlos III de Madrid, Leganés, Madrid, Spain
Carlos García-Rubio
Carlos García-Rubio
Universidad Carlos III de Madrid
internetcommunications networks
Celeste Campo
Celeste Campo
Associate Professor
Computer Networks