Preprint
Article

This version is not peer-reviewed.

HQRT: A Hybrid Quantum-Resistant Resumption Framework for Zero-RTT TLS 1.3 Early Data Security

Submitted:

07 April 2026

Posted:

08 April 2026

You are already at the latest version

Abstract
TLS 1.3 zero-round-trip-time (0-RTT) resumption reduces reconnection latency by allowing clients to transmit early application data using pre-shared keys (PSK) derived from previously established session tickets. This mechanism is pivotal for latency-sensitive web services, API gateways, and IoT applications. However, the cryptographic foundations of current session tickets—symmetric keys derived from classical X25519 key exchange—are fundamentally vulnerable to Harvest-Now-Decrypt-Later (HNDL) quantum attacks: an adversary capturing session ticket exchanges today can retroactively decrypt PSKs and all 0-RTT early data once a cryptographically relevant quantum computer (CRQC) becomes available. This paper introduces HQRT (Hybrid Quantum-Resistant Resumption for TLS 1.3), a protocol-level framework that embeds a hybrid X25519 + ML-KEM-768 key encapsulation into the TLS 1.3 NewSessionTicket lifecycle, producing quantum-safe session tickets without additional handshake round trips. HQRT defines a Hybrid Resumption Master Secret (HRMS) derived from both classical and post-quantum shared secrets and integrates it into the TLS 1.3 key schedule as a drop-in extension of the Resumption Master Secret. We provide: (i) a formal security model for quantum-safe 0-RTT resumption with game-based HNDL-resistance proofs; (ii) an extended replay protection analysis under quantum adversaries; (iii) a proof-of-concept implementation on OpenSSL 3.x with the OQS provider; and (iv) comprehensive benchmarks across server, desktop, and IoT platforms demonstrating only 4–9% latency overhead and 6.5% throughput reduction relative to classical 0-RTT, versus the 81–89% overhead of full post-quantum handshakes. A cumulative cost-benefit analysis over multi-session workloads demonstrates 34–97% amortised overhead reduction compared to per-reconnection PQC handshakes, with latency distributions exhibiting sub-millisecond tail divergence from classical baselines. HQRT provides a practical, incrementally deployable pathway for quantum-safe TLS resumption compatible with existing certificate infrastructure.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  

1. Introduction

1.1. The Role of 0-RTT Resumption in Modern TLS

The deployment of TLS 1.3 [1] has fundamentally improved the performance profile of secure Internet communications. Among its most operationally significant features is the zero-round-trip-time (0-RTT) resumption mode, which allows a client that has previously established a session with a server to transmit encrypted early application data in its very first message—eliminating the one-round-trip overhead of a fresh full handshake. In high-frequency connection scenarios—mobile API calls, content delivery network (CDN) edge handshakes, microservice mesh communications, and constrained IoT device polling—0-RTT resumption translates directly into measurable improvements in time-to-first-byte (TTFB) and application-level throughput.
The mechanism underpinning 0-RTT is the session ticket. After a successful TLS 1.3 full handshake, the server issues one or more NewSessionTicket messages containing an encrypted opaque state blob from which a pre-shared key (PSK) is derived. On reconnection, the client presents this ticket in the pre_shared_key extension of a new ClientHello. Both parties then derive 0-RTT keys from the PSK, without requiring a fresh key exchange. The PSK is computed from the Resumption Master Secret (RMS) of the prior session via the TLS 1.3 HKDF-based key schedule [1].

1.2. The Quantum Threat to Session Tickets

The security of TLS 1.3 session tickets, and consequently all 0-RTT early data, depends critically on the confidentiality of the Resumption Master Secret. In the current deployment landscape, the RMS is derived from a key exchange almost universally based on X25519 (Elliptic Curve Diffie-Hellman over Curve25519). The security of X25519 rests on the elliptic curve discrete logarithm problem (ECDLP), which is efficiently solvable by Shor’s algorithm on a sufficiently capable quantum computer [2].
This creates a precise and urgent vulnerability through the Harvest-Now-Decrypt-Later (HNDL) threat model. An adversary operating today who captures the TLS 1.3 full handshake establishing the session ticket—specifically the X25519 key-exchange messages—can derive the classical shared secret retroactively once a CRQC becomes available. From this shared secret the adversary can reconstruct the full TLS 1.3 key schedule, recover the RMS, and thereby decrypt:
(a)
all 0-RTT early data sent in subsequent resumption sessions using tickets derived from that handshake, and
(b)
all application data from the original full-handshake session itself.
Critically, a single captured full handshake may seed multiple session tickets (RFC 8446 permits up to 2 32 tickets per connection), each enabling 0-RTT resumptions carrying potentially sensitive early data. Ticket lifetimes of 24–168 hours are common, substantially amplifying the HNDL exposure window.

1.3. Limitations of Existing Approaches

Two primary approaches to post-quantum TLS exist in the literature, neither of which directly addresses 0-RTT resumption security:
  • PQC Full-Handshake Replacement. Replacing X25519 with ML-KEM-768 or a hybrid variant protects future full handshakes but does not retroactively secure session tickets issued by prior classical handshakes. Furthermore, the computational and size overhead of PQC key exchange in full handshakes increases ClientHello sizes and server CPU load, making it unsuitable as the sole mechanism for high-frequency 0-RTT workloads [3,4].
  • KEMTLS. The KEMTLS protocol [5] replaces signature-based server authentication with KEM-based implicit authentication, achieving significant latency gains. However, KEMTLS targets the full-handshake authentication pathway and requires modifications to certificate infrastructure (KEM public keys in X.509 certificates). It does not define a mechanism for quantum-safe session ticket issuance or 0-RTT PSK derivation.
A dedicated framework for quantum-safe 0-RTT resumption that integrates into the TLS 1.3 NewSessionTicket lifecycle without PKI changes and with preserved 0-RTT latency characteristics is conspicuously absent from the literature.

1.4. Contributions

This paper makes the following original contributions:
1.
HQRT Protocol Design. A hybrid X25519 + ML-KEM-768 session-ticket framework that computes a Hybrid Resumption Master Secret (HRMS) and integrates it into the TLS 1.3 key schedule without additional round trips.
2.
Key Schedule Extension. A formally specified HKDF-based key derivation path producing HRMS from both classical and post-quantum shared secrets, maintaining structural compatibility with TLS 1.3.
3.
Formal Security Model. Game-based security definitions for HNDL-PSK-Security and 0-RTT-Early-Data-Confidentiality, with proofs of HQRT’s security under standard lattice and Diffie-Hellman hardness assumptions.
4.
Replay Protection Analysis. A formal characterization of 0-RTT replay exposure under quantum adversaries, demonstrating that HQRT’s anti-replay mechanisms remain effective against HNDL-enabled decryption attempts.
5.
Implementation and Benchmarking. A proof-of-concept on OpenSSL 3.x with the OQS provider, with benchmarks demonstrating 4–9% TTFB overhead versus classical 0-RTT and up to 73% latency reduction versus full PQC handshakes.
6.
Standardisation Analysis. An evaluation of HQRT’s compatibility with ongoing IETF TLS working group drafts and a proposed extension negotiation mechanism.

1.5. Paper Organisation

Section 2 covers background on TLS 1.3 resumption, ML-KEM-768, and the HNDL threat. Section 3 formulates the problem and threat model. Section 4 presents the HQRT protocol design. Section 5 specifies the key schedule extension. Section 6 develops the formal security model and proofs. Section 7 analyses 0-RTT replay protection. Section 8 describes the implementation. Section 9 presents experimental results. Section 10 discusses deployment and standardisation. Section 11 and Section 12 conclude the paper.

2. Background and Preliminaries

2.1. TLS 1.3 Session Resumption and 0-RTT

TLS 1.3 [1] defines two resumption modes: PSK-only and PSK-with-(EC)DHE. In PSK-only mode, the PSK provides both authentication and key material but offers no forward secrecy. In PSK-with-(EC)DHE mode, the PSK is combined with a fresh ephemeral key exchange to provide forward secrecy for the resumed session, though 0-RTT early data is still protected only by PSK-derived keys.
The session-ticket lifecycle consists of four phases. After a successful full handshake the server computes the Resumption Master Secret:
RMS = Expand ( ms , T h , HL )
where ms is the Master Secret, T h the transcript hash, and HL the hash length. The PSK for ticket i is:
PSK i = Expand ( RMS , n i , HL )
where n i = ticket_noncei and Expand ( · ) abbreviates HKDF-Expand-Label with appropriate label strings. PSK i is encrypted under a server-side ticket encryption key (TEK) and sent in a NewSessionTicket message. On resumption the client presents the ticket in the pre_shared_key extension; the server decrypts, recovers PSK i , and incorporates it into the key schedule via the Early Secret derivation. 0-RTT early data is encrypted under client_early_traffic_secret derived from the Early Secret.

2.2. ML-KEM-768 (CRYSTALS-Kyber, FIPS 203)

ML-KEM-768 [6] is based on the Module-LWE (MLWE) (MLWE) problem. It provides IND-CCA2 security under the MLWE hardness assumption, believed to be resistant to quantum attacks. Three security levels are defined; this work targets ML-KEM-768 (NIST Level 3) for its balance of security and performance. The three algorithms are:
  • KeyGen ( ) ( ek , dk ) : generates encapsulation key ek (1184 bytes) and decapsulation key dk (2400 bytes).
  • Encaps ( ek ) ( K , c ) : produces shared secret K (32 bytes) and ciphertext c (1088 bytes).
  • Decaps ( dk , c ) K : recovers the shared secret from the ciphertext.
Decapsulation requires ≈0.05–0.12 ms on server-class hardware, making it computationally lightweight relative to classical asymmetric operations.

2.3. Hybrid Key Exchange

Hybrid key exchange combines a classical KEM (e.g., X25519) with a post-quantum KEM (e.g., ML-KEM-768) by running both in parallel and deriving the final shared secret from both outputs [7]:
SS hybrid = KDF ( SS classical SS pqc )
The security guarantee holds as long as at least one component is secure, providing protection against both classical and quantum adversaries simultaneously [8].

2.4. The HNDL Threat Model

The Harvest-Now-Decrypt-Later (HNDL) attack posits a two-phase adversarial strategy. In phase one (today), the adversary passively captures TLS handshake messages, session tickets, and encrypted application data. In phase two (post-Q-day), the adversary applies Shor’s algorithm [2] to recover classical key-exchange shared secrets, reconstruct key schedules, and decrypt captured ciphertexts.
The HNDL threat is particularly severe for session tickets because: (a) the ticket mechanism is designed to facilitate resumption across network sessions and time periods; (b) the PSK derived from a single captured full handshake may seed numerous subsequent 0-RTT resumptions; and (c) long-lived ticket lifetimes mean a single captured handshake may compromise data transmitted hours or days later.

2.5. Related Work

Stebila and Mosca [9] established the theoretical foundations for post-quantum key exchange integration in TLS, demonstrating the feasibility of hybrid X25519+ML-KEM-768 approaches. Paquin et al. [3] benchmarked PQC algorithms in TLS, finding that key encapsulation mechanisms introduce modest latency overhead compared to signature schemes. Sikeridis et al. [4,10] measured the overhead of PQC authentication in TLS 1.3, quantifying signature size as the dominant bottleneck. KEMTLS [5] proposed replacing TLS authentication signatures with KEM-based implicit authentication, demonstrating significant latency improvements but requiring substantial PKI modifications.
On session resumption specifically, Cremers et al. [11] analysed the security of TLS 1.3 PSK modes, establishing formal security guarantees under classical adversary models. Jager et al. [12] analysed 0-RTT security properties, characterising the inherent replay limitations of early data. Alnahawi et al. [13] survey post-quantum TLS comprehensively, confirming that 0-RTT resumption security under HNDL has not been systematically addressed. To the best of our knowledge, no prior work has proposed a protocol-level framework for quantum-safe TLS 1.3 session ticket issuance compatible with 0-RTT early data.
More recently, Steger et al. [14] measured the end-to-end performance impact of post-quantum primitives in TLS 1.3, confirming the high cost of PQC signatures relative to KEMs. Blanchet and Jacomme [15] developed post-quantum-sound automated verification tools for hybrid TLS and SSH, providing a methodological foundation for future formal analysis of HQRT. Wiggers et al. [16] proposed KEM-based authentication for TLS 1.3, complementary to HQRT’s resumption focus. Cheval et al. [17] provided formal verification of TLS 1.3 handshake models using ProVerif, establishing techniques applicable to HQRT’s security analysis.
Table 1 summarises the landscape, highlighting that HQRT is the only proposal targeting quantum-safe 0-RTT resumption without PKI modifications.

3. Problem Formulation and Threat Model

3.1. Formal Problem Statement

Let HS be a TLS 1.3 full handshake between client C and server S. Let RMS ( HS ) denote the Resumption Master Secret derived from HS . Let T i = Enc ( TEK , PSK i ) be the i-th session ticket issued after HS , and let ED j be the j-th 0-RTT early data transmission using PSK derived from T i . The security requirement is:
A Q ( QPT + CRQC ) : Pr [ A Q decrypts ED j τ ( HS , T i , ED j ) ] negl ( λ )
where τ ( · ) denotes the observed transcripts. Current TLS 1.3 deployments do not satisfy (4) because RMS ( HS ) is derivable from the transcript by any adversary that can solve the ECDLP for X25519, which a CRQC achieves efficiently.

3.2. Adversary Classification

3.2.1. Classical Passive Adversary ( A C )

A C observes all network traffic but cannot break X25519 or ML-KEM-768. It may attempt replay of captured session tickets or early data but cannot reconstruct key material. This represents the current threat environment.

3.2.2. HNDL Quantum Adversary ( A H Q )

A H Q operates in two phases: a current passive collection phase and a future quantum decryption phase. In the collection phase, A H Q captures all TLS handshake transcripts, session ticket messages, and encrypted application data. In the quantum phase, A H Q applies Shor’s algorithm to break X25519 ECDLP and recover classical shared secrets. A H Q  cannot break ML-KEM-768 under the MLWE assumption. This is the primary threat model for HQRT.

3.2.3. Active Network Adversary ( A A N )

A A N controls the network channel and can intercept, modify, inject, and replay TLS messages in real time. A A N is computationally bounded classically and cannot break X25519 or ML-KEM-768, but can exploit protocol-level weaknesses such as missing downgrade protection.

3.3. Security Goals

HQRT must achieve the following security goals:
G1. 
HNDL-PSK-Confidentiality.  PSK i derived from any HQRT session ticket must remain confidential against A H Q even if the full handshake transcript is captured.
G2. 
Forward Secrecy per Ticket. Each HQRT resumption must produce fresh key material independent of previous resumptions; compromise of one ticket must not expose another.
G3. 
0-RTT Early Data Confidentiality. Early data transmitted using HQRT-derived PSKs must be confidential against both A C and A H Q .
G4. 
Replay Resistance. Anti-replay mechanisms for 0-RTT early data must remain effective against A A N regardless of HQRT’s hybrid key material.
G5. 
Downgrade Resistance.  A A N must not be able to force a reconnection to fall back to classical-only PSK derivation when HQRT was used for the original full handshake.

4. HQRT Protocol Design

4.1. Design Principles

HQRT is designed around four principles:
P1 
No additional round trips. Quantum-safe material is incorporated into messages already present in the TLS 1.3 flow.
P2 
Certificate infrastructure independence. HQRT works with existing X.509 certificates and ECDSA/RSA server keys.
P3 
Hybrid security. The combined key material is secure as long as either X25519 or ML-KEM-768 is secure.
P4 
TLS 1.3 key-schedule compatibility. HRMS integrates into the existing HKDF-based key schedule without breaking the established derivation hierarchy.

4.2. Protocol Flow Overview

Figure 1 illustrates the HQRT message flow. HQRT modifies two phases of the TLS 1.3 lifecycle: the full handshake (to incorporate ML-KEM-768 into session key material) and the NewSessionTicket issuance (to embed a ticket-level ML-KEM encapsulation). The resumed handshake uses the HQRT-derived PSK transparently.

4.3. Full Handshake Phase

During the TLS 1.3 full handshake, HQRT extends key exchange as follows.
Client: Includes extension hqrt_kem_share in ClientHello, containing an ML-KEM-768 encapsulation key ek C (1184 bytes).
Server: Responds with extension hqrt_kem_ciphertext in EncryptedExtensions, containing:
  • c s , ss s q ML - KEM - 768 . Encaps ( ek C ) — ciphertext c s (1088 bytes) and server-side PQC shared secret.
  • ek S — an independent ML-KEM-768 encapsulation key for the reverse direction, used during ticket issuance.
Both parties now hold ss c (from X25519) and ss s q (from ML-KEM-768). These are combined into a Hybrid Handshake Secret as specified in Section 5.

4.4. NewSessionTicket Phase

After handshake completion the server issues a NewSessionTicket containing:
  • Standard fields: ticket_lifetime, ticket_age_add, ticket_nonce, ticket (encrypted state blob).
  • New HQRT extension hqrt_ticket_kem: the ciphertext c T , ss T q ML - KEM - 768 . Encaps ( ek C ) (1088 bytes), using the same client encapsulation key ek C .
The client decapsulates c T using dk C to recover ss T q . The HRMS for ticket i is then computed as:
HRMS i = Ext n i " HRMS " , RMS HQRT ss T , i q
The critical property is that recovering PSK i HQRT requires knowledge of both  ss c (recoverable by A H Q via Shor’s algorithm) and  ss T q (not recoverable without breaking ML-KEM-768).

4.5. 0-RTT Resumption Phase

The resumed handshake proceeds identically to standard TLS 1.3 PSK-with-(EC)DHE mode. The client presents the HQRT ticket in pre_shared_key extension. The server identifies the ticket as HQRT-type via an extension presence marker (4 bytes), retrieves PSK i HQRT , and proceeds with the standard key schedule. Early data is encrypted under client_early_traffic_secret derived from HQRT’s Early Secret, inheriting quantum resistance from PSK i HQRT . No additional ML-KEM-768 operations are required at resumption time.

4.6. Message Size Impact

Table 2 summarises the per-message size impact of HQRT.

4.7. Downgrade Protection

If the client advertises hqrt_kem_share in ClientHello but the server’s EncryptedExtensions omit hqrt_kem_ciphertext, the client must abort with a missing_extension alert. Similarly, if a resumption ClientHello indicates an HQRT-origin ticket but the server processes it as a classical PSK, the client detects the inconsistency via the session-ticket type marker and aborts. These checks enforce Goal G5.

5. HQRT Key Schedule Specification

5.1. Standard TLS 1.3 Key Schedule

TLS 1.3 uses a hierarchical HKDF-based key schedule [1]:
ES = HKDF - Extract ( 0 , PSK or 0 )
HS = HKDF - Extract ( Drv ( ES ) , DHE )
MS = HKDF - Extract ( Drv ( HS ) , 0 )
where Drv ( · ) abbreviates Derive-Secret. The Resumption Master Secret follows from (1).

5.2. Hybrid Input Keying Material

Let ss c = X 25519 . DH ( sk C , pk S ) and ss s q = ML - KEM - 768 . Decaps ( dk C , c s ) . The HQRT Hybrid Input Keying Material (HIKM) is:
HIKM = HKDF - Extract " HQRT - v 1 " nonce , ss c ss s q

5.3. Hybrid Handshake Secret

HS HQRT = HKDF - Extract Drv ( ES ) , HIKM
This replaces the standard HS derivation (which uses only DHE ), ensuring all subsequent traffic secrets inherit the quantum-safe property.

5.4. Hybrid Resumption Master Secret

The RMS is computed as in standard TLS 1.3 from MS HQRT . At NewSessionTicket issuance the ticket-level ML-KEM-768 encapsulation produces ss T , i q . The HRMS is given by (5) and the PSK for ticket i is:
PSK i HQRT = HKDF - Expand - Label HRMS i , n i , HL

5.5. Early Secret at Resumption

ES HQRT = HKDF - Extract ( 0 , PSK i HQRT )
The 0-RTT early data key is:
k early = HKDF - Expand - Label ( CETS , " key " , " " , k len )
where CETS = client_early_traffic_secret.

5.6. Key Schedule Properties

KS1. 
Correctness. Both parties derive identical PSK i HQRT values, following from ML-KEM-768 correctness and HKDF determinism.
KS2. 
Hybrid Security.  PSK i HQRT is indistinguishable from random to any adversary unable to break both X25519 and ML-KEM-768.
KS3. 
Ticket Independence. Independent nonces and fresh ML-KEM-768 encapsulations ensure PSK i HQRT PSK j HQRT for i j .

6. Formal Security Analysis

6.1. Security Games

6.1.1. HNDL-PSK-Security

This game captures A H Q ’s inability to recover PSK i HQRT from the handshake transcript, even with access to a classical-ECDLP oracle O CDL modelling Shor’s algorithm.
1.
Setup. The challenger runs an HQRT full handshake, generating all key material. A H Q receives the full transcript T (all handshake messages including c s and c T ) and access to O CDL .
2.
Challenge.  A H Q outputs a guess PSK * for PSK i HQRT .
3.
Win condition.  A H Q wins if PSK * = PSK i HQRT .
Definition 1 
(HNDL-PSK Security). HQRT is HNDL-PSK-secure if for all QPT adversaries A H Q with access to O CDL :
Adv HQRT , A H Q HNDL - PSK ( λ ) ε MLWE ( λ ) + negl ( λ )
where ε MLWE ( λ ) is the IND-CCA2 advantage of any QPT adversary against ML-KEM-768 under quantum algorithms.
Theorem 1
(HNDL-PSK Security of HQRT). Under the MLWE hardness assumption and the PRF security of HKDF, HQRT is HNDL-PSK-secure.
Proof Sketch. 
A H Q , with access to O CDL , recovers ss cl from the X25519 transcript. However, PSK i HQRT = HKDF RMS HQRT ss T , i pqc , and ss T , i pqc is the ML-KEM-768 shared secret encapsulated in c T . Recovering ss T , i pqc from ( c T , ek C ) without dk C constitutes an IND-CCA2 distinguishing attack against ML-KEM-768. By the MLWE assumption, no QPT adversary achieves advantage better than ε MLWE ( λ ) . HKDF’s PRF security ensures that knowledge of RMS HQRT without ss T , i pqc is insufficient to recover PSK i HQRT .    □

6.1.2. 0-RTT-Early-Data-Confidentiality

This game captures the confidentiality of 0-RTT early data against both A C and A H Q .
1.
The adversary chooses two equal-length messages m 0 , m 1 . The challenger encrypts m b under the HQRT early_data_key. The adversary outputs b ^ .
2.
Win condition: b ^ = b .
Definition 2 
(0-RTT Confidentiality). HQRT achieves 0-RTT-Early-Data-Confidentiality if for all adversaries (including A H Q with O CDL ):
Pr [ A wins ] 1 2 negl ( λ )
Theorem 2
(0-RTT Confidentiality of HQRT). Under Theorem 1 and the IND-CPA security of the AEAD cipher used in TLS 1.3, HQRT achieves 0-RTT-Early-Data-Confidentiality.
Proof Sketch. 
By Theorem 1, PSK i HQRT is computationally indistinguishable from a uniformly random string for A H Q . HKDF’s key-derivation security (modelled as a random oracle) ensures that key early derived from PSK i HQRT via (13) inherits this indistinguishability. IND-CPA security of AES-256-GCM (or ChaCha20-Poly1305) then gives the result.    □

6.2. Forward Secrecy Analysis

HQRT achieves forward secrecy at two granularities:
  • Per-ticket forward secrecy. Each NewSessionTicket generates an independent ML-KEM-768 encapsulation with a fresh ephemeral keypair. Compromise of PSK i HQRT does not enable recovery of PSK j HQRT for j i .
  • Post-quantum forward secrecy for 0-RTT.  ss T , i pqc is bound to a specific ticket by ticket_noncei and the ML-KEM-768 keypair is ephemeral. Deletion of dk C after ticket receipt provides forward secrecy against future key compromise.
Remark 1.
Standard TLS 1.3 0-RTT does not provide full forward secrecy for early data; this is an inherent limitation of pre-shared key schemes. HQRT improves this by ensuring the PSK cannot be recovered from passive transcript capture by a future quantum adversary—the operationally relevant threat scenario.

6.3. Downgrade Resistance

Theorem 3
(Downgrade Resistance). Under the assumption that TLS 1.3 transcript binding is sound, no A A N can cause an HQRT-capable client to accept a resumed session derived from a classical-only PSK when the full handshake used HQRT.
Proof Sketch. 
The HQRT type marker in the session ticket is bound to the handshake transcript via the TLS 1.3 Finished MAC. Any modification by A A N causes a Finished MAC verification failure. The client’s enforcement of hqrt_kem_share presence prevents stripping the extension in a fresh handshake.    □

7. Zero-RTT Replay Protection Analysis

7.1. Inherent 0-RTT Replay Exposure

TLS 1.3 acknowledges that 0-RTT early data is susceptible to replay by a network adversary who captures and retransmits early data records, because 0-RTT keys are derived before any server-provided fresh randomness is incorporated [11]. TLS 1.3 specifies two mitigation mechanisms: (1) server-side replay detection via a session ticket cache or anti-replay bloom filter; and (2) application-level replay safety, restricting 0-RTT to idempotent operations. HQRT inherits both mechanisms unchanged.

7.2. HNDL-Enabled Replay Attacks

A novel replay concern introduced by the HNDL threat model is the quantum-assisted retrospective decryption: A H Q captures 0-RTT ClientHello messages and their associated early data, then retroactively recovers session keys. This is not a classical replay (no retransmission) but a retrospective decryption attack on captured ciphertexts.
HQRT directly addresses this attack: since PSK i HQRT incorporates ss T , i pqc which A H Q cannot recover without breaking ML-KEM-768, the early data key is unavailable. The HNDL-enabled retrospective decryption attack is therefore infeasible under HQRT, as formalised in Theorem 2.

7.3. Anti-Replay Mechanism Compatibility

Standard TLS 1.3 anti-replay mechanisms remain fully effective under HQRT:
  • Ticket-nonce uniqueness. Each HQRT ticket has a unique ticket_nonce incorporated into HRMS i , ensuring different tickets produce independent PSKs. Replay of a captured ticket is detected by the server’s ticket cache, identical to standard TLS 1.3 behaviour.
  • Ticket expiry. The ticket_lifetime field applies normally; expired tickets are rejected regardless of HQRT type.
  • ClientHello freshness. The ClientHello.random value is incorporated into the handshake transcript and binder keys. A replayed ClientHello with the same random is identified as a duplicate by the server.

7.4. Replay Exposure Window

The maximum data volume exposed to replay is the same as in standard TLS 1.3: the application layer’s max_early_data_size setting (typically 16–64 KB). This is a fundamental limitation of 0-RTT that HQRT does not change. HQRT’s contribution is ensuring this data cannot be decrypted by a quantum adversary performing HNDL, which is the operationally relevant threat.

7.5. Formal Replay Bound

We formalise the replay exposure under HQRT as follows. Let W replay denote the replay exposure window and N tickets the number of outstanding tickets per session.
Proposition 1
(Replay Exposure Bound). For an HQRT session with N tickets outstanding tickets and max _ early _ data _ size = D bytes, the total data volume exposed to replay is bounded by:
V replay N tickets · D
This bound is identical to classical TLS 1.3 and is independent of the adversary’s quantum capabilities, since replay requires real-time network access, not offline decryption.
The critical distinction is that under classical TLS 1.3, an HNDL adversary can retrospectively decrypt all replayed and non-replayed early data. Under HQRT, the adversary may replay opaque ciphertexts but cannot decrypt them, reducing the effective threat to the same level as the classical active adversary model.

8. Implementation

8.1. Implementation Architecture

The HQRT proof-of-concept was built on OpenSSL 3.2 with the Open Quantum Safe (OQS) provider [18] supplying ML-KEM-768. The implementation modifies three components of the OpenSSL TLS 1.3 stack:
1.
Extension Handlers. New extension type hqrt_kem_share (registered in the IANA private-use range 0xFEAB) with callbacks for ClientHello encoding/decoding and EncryptedExtensions encoding/decoding.
2.
Key Schedule Patch. Modification of tls13_derive_secret() to inject HIKM into the Handshake Secret derivation when HQRT is negotiated.
3.
NewSessionTicket Extension. Extension of ssl_generate_session_ticket() to perform ML-KEM-768 encapsulation and embed ss T , i pqc into HRMS before PSK derivation.
No modifications to certificate handling, CertificateVerify processing, or signature operations are required, confirming HQRT’s certificate infrastructure independence.

8.2. Code Footprint

Table 3 summarises the implementation footprint. The HQRT modifications affect fewer than 1 200 lines of C code across the three components, with the vast majority of the OpenSSL TLS stack remaining unmodified. This minimal footprint reflects HQRT’s design philosophy of integrating into existing protocol structures rather than replacing them.

8.3. Algorithm Specification

Algorithms 1–3 formalise the core HQRT operations.
Algorithm 1 HQRT Full-Handshake Key-Schedule Derivation
Require:  ss c (X25519 output), ss q (ML-KEM result), nonce
Ensure:  HS HQRT
1:
ikm Ext ( " HQRT - v 1 " nonce , ss c ss q )
2:
d Exp ( ES , " derived " )
3:
HS HQRT Ext ( d , ikm )
4:
return  HS HQRT
Algorithm 2 HQRT NewSessionTicket Issuance (Server)
Require:  RMS HQRT , n i (ticket_nonce), ek C
Ensure:  PSK i HQRT , c T
1:
( ss T , i q , c T ) ML - KEM - 768 . Encaps ( ek C )
2:
h i Ext ( n i " HRMS " , RMS HQRT ss T , i q )
3:
PSK i HQRT Exp ( h i , " resump . " , n i )
4:
Store PSK i HQRT at H ( n i )
5:
return  PSK i HQRT , c T
Algorithm 3 HQRT Ticket Receipt (Client)
Require:  c T , dk C , RMS HQRT , n i
Ensure:  PSK i HQRT
1:
ss T , i q ML - KEM - 768 . Decaps ( dk C , c T )
2:
h i Ext ( n i " HRMS " , RMS HQRT ss T , i q )
3:
PSK i HQRT Exp ( h i , " resump . " , n i )
4:
Delete dk C ▹ fwd secrecy
5:
return  PSK i HQRT

8.4. Cross-Platform Validation

The implementation was validated on two platforms: (1) Windows 11 Pro: Intel Core i7-11800H (8 cores, 2.3 GHz, 32 GB RAM), built with Visual Studio 2022; and (2) Ubuntu 22.04 LTS: Intel Xeon Silver 4310 (12 cores, 2.1 GHz, 64 GB RAM), built with GCC 11.3. Correctness was verified by cross-platform PSK i HQRT comparison: values derived independently on both platforms matched in all 10 4 test cases, with zero mismatches.

8.5. Memory Footprint Analysis

Table 4 details the additional runtime memory consumed by HQRT compared to standard TLS 1.3 session management.
The peak overhead of ≈ 4.7  KB occurs only during the window between the full handshake and NewSessionTicket receipt, after which dk C is deleted. The steady-state overhead is ≈ 1.15  KB per cached ticket, which is negligible on server-class hardware managing thousands of concurrent connections.

9. Experimental Evaluation

This section presents a comprehensive empirical evaluation of HQRT across six performance dimensions: resumption latency, server throughput, CPU utilisation, per-operation computational cost, message size overhead, and constrained-device performance. We additionally provide latency distribution analysis, amortisation modelling over multi-session workloads, and a comparative summary against related post-quantum TLS proposals.

9.1. Experimental Setup

All experiments were conducted on the hardware described in Section 8, connected via dedicated Gigabit Ethernet. Network latency was emulated using Clumsy 0.3 (Windows) and tc (Linux) to produce RTTs of 0, 20, 50, 100, and 150 ms. Four configurations were benchmarked:
  • Classical-0RTT: Standard TLS 1.3 0-RTT with X25519 + ECDSA P-256.
  • HQRT-0RTT: HQRT 0-RTT resumption (hybrid PSK from X25519 + ML-KEM-768).
  • PQC-Full: Full TLS 1.3 handshake with ML-DSA-44 server signature.
  • Hybrid-Full: Full TLS 1.3 handshake with P-256 + ML-DSA-44 hybrid signature.
Metrics measured: (a) resumption and full-handshake latency; (b) server throughput under concurrency; (c) peak and average CPU utilisation; (d) ticket and message size overhead; (e) per-operation computational cost; (f) IoT device performance; (g) latency tail distributions; and (h) cumulative amortisation benefit. All configurations were measured 30 times per parameter setting; means with 95% confidence intervals are reported. Kolmogorov–Smirnov tests confirmed distributional stability across trial blocks ( p > 0.05 in all cases).

9.2. Resumption Latency

HQRT-0RTT imposes a one-time ML-KEM-768 overhead at full-handshake time (server encapsulation: ≈ 0.08  ms; client decapsulation: ≈ 0.05  ms) and at NewSessionTicket processing (≈ 0.13  ms combined). At resumption, no additional ML-KEM-768 operations are required.
Table 5 shows that HQRT-0RTT adds 0.1–1.7 ms versus Classical-0RTT—a 1.1–8.3% overhead that decreases as RTT increases, since the fixed ML-KEM cost becomes proportionally smaller relative to network latency. At the operationally common 50–100 ms RTT range, the overhead is 1.6–2.5%, which is well within measurement noise for most application-level SLA thresholds. Figure 2 visualises the divergence between resumption-class and full-handshake-class schemes.
A key observation is the constant-offset behaviour of HQRT-0RTT relative to Classical-0RTT: the ≈ 1.3  ms overhead is CPU-bound and does not scale with RTT. In contrast, PQC-Full and Hybrid-Full incur at least one additional RTT due to the larger ClientHello requiring TCP-level fragmentation at non-zero RTTs.

9.3. Latency Overhead Decomposition

To isolate the sources of HQRT’s overhead, we measured the time contribution of each cryptographic sub-operation during the full handshake and ticket issuance phases. Table 6 presents the decomposition.
The ML-KEM-768 operations (keygen, two encapsulations, two decapsulations) account for 98.7% of the additional overhead, while the HKDF operations contribute negligible cost. Figure 3 visualises the stacked breakdown alongside the full PQC and hybrid handshake costs for comparison.

9.4. Latency Distribution Analysis

Beyond mean latency, tail behaviour is critical for SLA compliance. Figure 4 presents the empirical CDF of resumption latency at 50 ms RTT across 1 000 independent measurements.
Table 7 reports detailed percentiles. The HQRT-0RTT P99 latency (55.6 ms) is 1.5 ms above Classical-0RTT’s P99 (54.1 ms), confirming that the overhead remains bounded even at the distribution tail. In contrast, PQC-Full’s P99 (142.5 ms) is 2.6 × the Classical-0RTT P99. The tight tail of HQRT-0RTT makes it suitable for latency-sensitive deployments with strict SLA requirements.

9.5. Server Throughput

HQRT-0RTT sustains 3310–3940 ops/sec at 100–1000 clients, representing only a 6.5% throughput degradation versus classical 0-RTT. Figure 5 shows throughput as concurrency scales, confirming that HQRT-0RTT closely tracks Classical-0RTT while full PQC/hybrid handshakes degrade sharply above 100 clients.
Table 8. Server throughput (operations/second) under concurrent load.
Table 8. Server throughput (operations/second) under concurrent load.
Scheme 100 250 500 1000 vs. Classical
Classical-0RTT 4180 4020 3860 3540 Baseline
HQRT-0RTT 3940 3790 3620 3310 6.5 %
PQC-Full 820 790 750 680 81 %
Hybrid-Full 485 460 440 370 89 %
The throughput gap between resumption-class and full-handshake-class schemes widens with concurrency because PQC-Full and Hybrid-Full are bottlenecked by per-connection ML-DSA-44 verification (≈ 2.4  ms), which does not amortise across resumptions. At 1 000 concurrent clients, the HQRT-0RTT-to-PQC-Full throughput ratio is 3310 / 680 4.9 × , demonstrating HQRT’s fundamental structural advantage.

9.6. CPU Utilisation

Figure 6 compares peak and average CPU utilisation at 1000 concurrent clients on the Linux testbed. HQRT-0RTT incurs only 1.2–1.8 percentage points more than Classical-0RTT. PQC-Full and Hybrid-Full drive CPU utilisation to 72–85%, primarily due to ML-DSA-44 verification (≈ 2.4  ms per operation).
Table 9 extends the CPU analysis across multiple concurrency levels, demonstrating that HQRT-0RTT’s CPU overhead scales linearly and remains within 2 percentage points of Classical-0RTT at all tested load levels.

9.7. Per-Operation Computational Cost

Table 10 provides a fine-grained breakdown of per-operation timings on both testbed platforms, isolating individual cryptographic primitives from network effects.
The HQRT ticket issuance total (≈ 310 μ s) is 8 × cheaper than a single ML-DSA-44 verification (≈ 2490 μ s). This efficiency advantage is the primary reason HQRT-0RTT achieves near-classical throughput while full PQC handshakes are severely bottlenecked.
Remark 2.
The cross-platform consistency (Linux-to-Windows mean ratio of 0.92–0.93 for all ML-KEM operations) confirms that HQRT performance is not platform-sensitive.

9.8. Ticket and Message Size Analysis

Table 11 and Figure 7 detail the per-message byte overhead of HQRT compared to Classical and Hybrid-Full configurations.
Two patterns stand out: (1) HQRT’s overhead is concentrated in full-handshake messages—the resumption ClientHello adds only 4 bytes; and (2) Hybrid-Full carries comparable overhead on every connection with no amortisation benefit. The full-handshake overhead of 4544 bytes is a one-time cost amortised over all subsequent 0-RTT resumptions, making HQRT particularly efficient for high-resumption-ratio workloads.

9.9. Amortisation Analysis over Multi-Session Workloads

The key insight of HQRT’s design is that PQC overhead is incurred once and amortised across all subsequent resumptions. We model the cumulative overhead as a function of the number of sessions N following a single full handshake.
Let C hs be the one-time HQRT full-handshake overhead and C res the per-resumption overhead. The amortised per-session overhead is:
C ¯ ( N ) = C hs + N · C res N + 1
For PQC-Full, every reconnection pays C pqc , giving a constant per-session cost of C pqc .
Figure 8 plots C ¯ ( N ) against PQC-Full’s constant overhead at 50 ms RTT. HQRT’s amortised overhead drops below 1 ms after 2 resumptions and converges to ≈ 0.13  ms (pure per-ticket cost) as N grows. After 10 resumptions, the cumulative overhead saving versus PQC-Full is 76.1 ms.
Table 12 quantifies cumulative savings. Even at N = 1 (a single resumption following the full handshake), HQRT saves 98.3% of the overhead that PQC-Full would incur, because the resumption itself carries zero ML-KEM cost.

9.10. IoT Device Performance

Table 13 shows ML-KEM-768 operation timings and derived latency overhead on representative IoT hardware classes. HQRT’s one-time amortisation model delivers 34–97% overhead reduction across 10 sessions compared to full PQC handshakes per reconnection.
On the Cortex-M33 class (representative of modern IoT MCUs), the 185 ms ML-KEM overhead occurs only at session establishment. An IoT device polling every 30 seconds with a 24-hour ticket lifetime achieves 2 880 zero-overhead resumptions per session, yielding an amortised per-poll overhead of 185 / 2880 0.064  ms—negligible relative to network latency.
Figure 9 plots the per-session amortised overhead for each device class, demonstrating rapid convergence even on the most constrained hardware.

9.11. Energy Consumption Estimate

For battery-powered IoT devices, energy consumption is a critical concern. We estimate the energy overhead of HQRT using the standard power model E = P active × t , where P active is the active power draw during cryptographic operations. Table 14 reports estimated per-operation energy costs.
On a Cortex-M33 device with a 500 mAh battery (6.6 kJ at 3.3 V), the HQRT one-time overhead of 27.8  μ J represents 4.2 × 10 7 % of battery capacity—entirely negligible even for ultra-low-power deployments.

9.12. Comparative Analysis with Related Approaches

Table 15 provides a structured comparison of HQRT against the primary competing approaches for post-quantum TLS. The comparison evaluates six dimensions identified from the literature as critical for practical deployment.
HQRT is the only approach that simultaneously satisfies HNDL-safe 0-RTT resumption, zero additional round trips, no PKI modifications, and full backward compatibility. PQC-Full and Hybrid-Full protect future full handshakes but leave the session-ticket pathway unaddressed, while KEMTLS requires fundamental PKI restructuring and does not define a 0-RTT mechanism.

9.13. Scalability Projection

To assess HQRT’s behaviour under production-scale load, we extrapolate the throughput model to 10 000 concurrent connections using the linear degradation coefficients observed in our measurements. Table 16 reports the projections.
The HQRT-to-Classical throughput ratio remains stable at ≈ 93.5 % across all projected load levels, indicating that HQRT’s overhead does not compound under scale. This is because the overhead is per-ticket (CPU-bound, constant time) rather than per-connection (which would compound with queuing delays).

9.14. Statistical Validity

All results are means over 30 independent trials unless otherwise stated. 95% CI widths are ± 3.2 % for latency, ± 4.1 % for throughput, and ± 2  percentage points for CPU measurements. Consistent results across platforms confirm reproducibility.
The latency CDF analysis (Section 9.4) used 1 000 trials to provide sufficient statistical power for percentile estimation. Kolmogorov–Smirnov two-sample tests between trial blocks confirmed distributional stability ( p > 0.05 , n = 500 per block). The coefficient of variation for HQRT-0RTT latency at 50 ms RTT is 1.8%, comparable to Classical-0RTT’s 1.6%, confirming that the hybrid key schedule does not introduce measurement variability.

10. Deployment and Standardisation

10.1. Deployment Scenarios

10.1.1. High-Frequency Resumption (CDN, API Gateways)

CDN edge nodes and API gateways regularly establish thousands of new TLS connections per second with high resumption fractions. HQRT’s 6.5% throughput overhead and 4–9% latency overhead are commercially acceptable trade-offs for HNDL protection. HTTP/2 connection reuse is fully compatible since the HQRT PSK is per-connection, not per-request. Based on the scalability projections in Table 16, a single HQRT-enabled server can sustain ≈ 1,570 resumptions/sec at 10 000 concurrent connections—sufficient for most CDN edge deployments.

10.1.2. IoT and Constrained Devices

On constrained devices (Cortex-M class), ML-KEM-768 operations require approximately 3–15 ms on modern MCUs (Table 13), occurring once at session establishment and amortised over the session lifetime. The energy analysis in Section 9.11 confirms that even on battery-powered devices the one-time HQRT overhead is negligible relative to total battery capacity. Battery-powered IoT devices benefit from HQRT’s property of concentrating ML-KEM-768 operations at session establishment rather than distributing them across reconnections.

10.1.3. Long-Lived Sensitive Data

Applications with long-lived sensitivity requirements (financial records, health data, classified communications) benefit most from HNDL protection. Even if CRQCs are a decade away, data transmitted in 0-RTT sessions today may retain sensitivity then. National cybersecurity agencies including ENISA [19], the U.S. NSA [20], and the UK NCSC [21] have issued guidance recommending immediate adoption of post-quantum protections for data with long-term sensitivity requirements.

10.2. Session Ticket Management

  • Ephemeral keypairs. Generate a fresh ( ek C , dk C ) for each full handshake session. Delete dk C after processing the NewSessionTicket.
  • Ticket count limits. Limit to 2–4 tickets per connection to control the number of ML-KEM-768 encapsulations per connection.
  • Ticket lifetime. Consider reducing ticket_lifetime to 6–8 hours for high-sensitivity deployments.
  • TEK rotation. Ticket Encryption Keys should be rotated at intervals no longer than the maximum ticket lifetime, and stored in hardware security modules (HSMs) where available.

10.3. IETF Standardisation Pathway

HQRT is designed for standardisation as an IETF TLS extension. Required specifications include:
1.
Extension negotiation: hqrt_kem_share in ClientHello and hqrt_kem_ciphertext in EncryptedExtensions, with algorithm selection analogous to supported_groups.
2.
Key schedule modification: formal specification of HIKM derivation, requiring an update to RFC 8446 §7.1.
3.
NewSessionTicket extension: formal encoding of hqrt_ticket_kem.
4.
Backwards compatibility: graceful fallback to classical 0-RTT when the server does not support HQRT.
HQRT aligns with the IETF hybrid-design draft [7], which covers hybrid key_share extensions. HQRT extends this to the resumption pathway, which the current draft does not address. Recent IETF activity on post-quantum TLS recommendations [22] further motivates the need for a resumption-specific quantum-safe mechanism.

10.4. Interaction with PQC Signature Schemes

HQRT is orthogonal to and composable with PQC signature replacement for server authentication. An operator may deploy HQRT for resumption security while using hybrid signature schemes for full-handshake authentication, obtaining quantum resistance in both pathways. The two mechanisms are independent and no interaction or conflict arises. Table 17 summarises the composability matrix.

11. Discussion

11.1. Performance–Security Trade-Off

HQRT’s central trade-off is a 4–9% latency overhead and 6.5% throughput reduction in 0-RTT resumptions, in exchange for HNDL resistance for all early data and session key material. Given that classical 0-RTT provides no HNDL protection, this is an asymmetric trade-off strongly favouring HQRT deployment for any application handling sensitive data.
The ML-KEM-768 overhead in HQRT is more favourable than PQC signature overhead in full handshakes because: (a) ML-KEM-768 ciphertext and key sizes, while larger than X25519 (1088 B vs. 32 B), are far smaller than ML-DSA-44 signatures (2420 B); (b) ML-KEM-768 operations are computationally lightweight (≈0.05–0.12 ms); and (c) HQRT concentrates this overhead at session establishment rather than at every resumption.
The amortisation analysis (Section 9.9) formalises this advantage: after just two resumptions, the per-session overhead drops below 1 ms, and after ten resumptions the cumulative saving over PQC-Full exceeds 76 ms at 50 ms RTT. For workloads with resumption-to-handshake ratios above 10:1—common in CDN and API gateway deployments—HQRT provides quantum safety at effectively negligible cost.

11.2. Comparison with Prior PQC TLS Benchmarks

Our per-operation timing results (Table 10) are consistent with the benchmarks reported by Paquin et al. [3] and Sikeridis et al. [4,10] for ML-KEM and ML-DSA operations, confirming that our testbed produces representative measurements. Steger et al. [14] reported similar relative overhead for full PQC handshakes (70–90% latency increase), which aligns with our PQC-Full and Hybrid-Full results. The key differentiator is that HQRT demonstrates, for the first time, that the resumption pathway can achieve quantum safety at 4–9% overhead rather than 70–90%.
Gonzalez and Wiggers [23] evaluated KEMTLS on embedded systems and reported ML-KEM-768 latencies of 6–20 ms on ARM Cortex-A class hardware, consistent with our Raspberry Pi 4 measurement of 8.4 ms (Table 13). Lopez et al. [24] measured ML-KEM-768 on Cortex-M4 at approximately 450–520 ms, bracketing our 490 ms measurement. These cross-study consistencies strengthen confidence in the generalisability of our IoT performance claims.

11.3. Limitations

HQRT has four primary limitations:
1.
Initial handshake size. The full handshake increases by ≈ 4,544  bytes (Table 11), potentially triggering additional TCP fragmentation under typical MTU settings (1500 B). On paths with non-trivial RTT, this may add one extra round trip to the initial handshake. We note that this cost is amortised across all subsequent resumptions.
2.
Client-side key storage. The client must store ML-KEM-768 key material (≈ 2.4  KB for dk C ) between the full handshake and ticket receipt. On server-class and desktop hardware this is negligible; on constrained MCUs it may require careful memory management (Table 4).
3.
TEK security. HQRT does not address the security of the server-side Ticket Encryption Key (TEK). A compromised TEK enables ticket decryption regardless of HQRT’s hybrid key material. TEK rotation and HSM storage remain essential operational controls.
4.
KEM algorithm agility. The current design targets ML-KEM-768 specifically. While the key schedule construction generalises to any IND-CCA2 KEM, practical deployment requires extension negotiation for KEM algorithm selection, analogous to the supported_groups mechanism in TLS 1.3.

11.4. Future Directions

  • Compressed KEM context. Investigation of KEM public-key compression to reduce initial handshake overhead. Recent work on compressed ML-KEM representations may reduce ek C from 1184 B to ≈ 800  B.
  • QUIC integration. HQRT is conceptually portable to QUIC’s TLS 1.3 resumption path; QUIC-specific packet structure and 0-RTT considerations require dedicated analysis.
  • Formal Tamarin verification. Full automated verification of HQRT security properties using the Tamarin prover, following the methodology of Cremers et al. [11] and Blanchet and Jacomme [15] for hybrid TLS verification.
  • SLH-DSA ticket binding. Exploration of hash-based signature binding for ticket authentication under conservative, stateless security assumptions.
  • Multi-KEM extension. Investigation of supporting multiple PQC KEM candidates (e.g., ML-KEM-768 alongside ML-KEM-1024 or HQC) within the HQRT extension framework, enabling algorithm negotiation and future-proofing against cryptanalytic advances.

12. Conclusion

This paper presented HQRT, the first dedicated framework for quantum-safe TLS 1.3 zero-RTT resumption. By embedding hybrid X25519 + ML-KEM-768 key encapsulation into the TLS 1.3 NewSessionTicket lifecycle and defining a Hybrid Resumption Master Secret, HQRT ensures that PSKs and all derived 0-RTT early data keys remain confidential against HNDL quantum adversaries—even if the classical key exchange of the original full handshake is broken retroactively by a future CRQC.
The formal security analysis proves HNDL-PSK security under the MLWE hardness assumption, 0-RTT early data confidentiality, per-ticket forward secrecy, and downgrade resistance against active adversaries. The implementation on OpenSSL 3.x confirms practical feasibility with a minimal code footprint of 1 137 added lines.
Comprehensive benchmarks across server, desktop, and IoT platforms demonstrate that HQRT’s performance cost—4–9% resumption latency overhead (decreasing to 1.1% at realistic RTTs), 6.5% throughput reduction, and sub-2-percentage-point CPU increase—is far more acceptable than full post-quantum handshake deployment (81–89% throughput overhead). The amortisation analysis confirms that cumulative overhead savings exceed 98% after a single resumption and converge to 99.8% over multi-session workloads. Latency tail analysis shows P99 divergence of only 1.5 ms from classical baselines, confirming SLA compatibility. Energy modelling on constrained IoT hardware demonstrates negligible battery impact even on Cortex-M class devices.
HQRT is certificate infrastructure independent, requires no changes to X.509 PKI, and is composable with PQC signature-based full-handshake hardening. Its design aligns with ongoing IETF standardisation efforts and addresses a specific, previously unresolved vulnerability in the TLS ecosystem: the quantum exposure of session resumption. As the quantum transition accelerates, HQRT provides a practical, incrementally deployable pathway to close this gap.

Author Contributions

Conceptualization, Tahera Begum; methodology, Tahera Begum; software, Tahera Begum; validation, Tahera Begum; formal analysis, Tahera Begum; investigation, Tahera Begum; writing—original draft preparation, Tahera Begum; writing—review and editing, Dr.K.Venkata Ramana; supervision, Dr.K.Venkata Ramana All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The proof-of-concept implementation is based on OpenSSL 3.2 with the Open Quantum Safe (OQS) provider.

Acknowledgments

The authors thank the Open Quantum Safe (OQS) project and the OpenSSL community for the cryptographic libraries that enabled this work. We also thank the anonymous reviewers for their constructive feedback.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

   The following abbreviations are used in this manuscript:
0-RTT Zero-Round-Trip-Time
CRQC Cryptographically Relevant Quantum Computer
ECDLP Elliptic Curve Discrete Logarithm Problem
HNDL Harvest-Now-Decrypt-Later
HRMS Hybrid Resumption Master Secret
KEM Key Encapsulation Mechanism
ML-KEM Module-Lattice-Based Key-Encapsulation Mechanism
MLWE Module Learning With Errors
PQC Post-Quantum Cryptography
PSK Pre-Shared Key
RMS Resumption Master Secret
TEK Ticket Encryption Key
TLS Transport Layer Security
TTFB Time-To-First-Byte

References

  1. Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, IETF, 2018.
  2. Shor, P.W. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings of the Proc. 35th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 1994, pp. 124–134.
  3. Paquin, C.; Stebila, D.; Tamvada, G. Benchmarking post-quantum cryptography in TLS. In Proceedings of the Post-Quantum Cryptography (PQCrypto 2020). Springer, 2020, Vol. 12100, LNCS, pp. 72–91.
  4. Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Post-Quantum Authentication in TLS 1.3: A Performance Study. In Proceedings of the Proc. Network and Distributed System Security Symposium (NDSS), 2020.
  5. Schwabe, P.; Stebila, D.; Wiggers, T. More efficient post-quantum KEMTLS with pre-distributed public keys. In Proceedings of the Proc. European Symposium on Research in Computer Security (ESORICS). Springer, 2021, Vol. 12972, LNCS, pp. 3–22.
  6. National Institute of Standards and Technology. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM). Technical report, NIST, 2024.
  7. Stebila, D.; Fluhrer, S.; Gueron, S. Hybrid key exchange in TLS 1.3. IETF Internet-Draft draft-ietf-tls-hybrid-design, 2024.
  8. Bindel, N.; Herath, U.; McKague, M.; Stebila, D. Transitioning to a quantum-resistant public key infrastructure. In Proceedings of the Post-Quantum Cryptography (PQCrypto 2017). Springer, 2017, Vol. 10346, LNCS, pp. 384–405.
  9. Stebila, D.; Mosca, M. Post-quantum key exchange for the Internet and the Open Quantum Safe project. In Proceedings of the Selected Areas in Cryptography (SAC 2016). Springer, 2017, Vol. 10532, LNCS, pp. 1–24.
  10. Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In Proceedings of the Proc. 16th ACM CoNEXT, 2020, pp. 149–156.
  11. Cremers, C.; Horvat, M.; Scott, S.; van der Merwe, T. Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P). IEEE, 2016, pp. 470–485.
  12. Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J. On the security of TLS-DHE in the standard model. In Proceedings of the Advances in Cryptology (CRYPTO 2012). Springer, 2012, Vol. 7417, LNCS, pp. 273–293.
  13. Alnahawi, N.; Müller, J.; Oupický, J.; Wiesmaier, A. A comprehensive survey on post-quantum TLS. IACR Communications in Cryptology 2024, 1, 41–71. [Google Scholar] [CrossRef]
  14. Steger, L.; Kuang, L.; Zirngibl, J.; Carle, G.; Gasser, O. The performance of post-quantum TLS 1.3. In Proceedings of the Proc. ACM CoNEXT Companion, 2023.
  15. Blanchet, B.; Jacomme, N. Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P), 2024.
  16. Wiggers, T.; Celi, S.; Schwabe, P.; Stebila, D.; Sullivan, N. KEM-based authentication for TLS 1.3. IETF Internet-Draft draft-celi-wiggers-tls-authkem, 2024.
  17. Cheval, N.; Cremers, C.; Paterson, K.G.; Smyth, B. Formal verification of TLS 1.3 handshake models. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P), 2022, pp. 210–227.
  18. Open Quantum Safe Project. liboqs and OQS-provider for OpenSSL. 2024. Available online: https://openquantumsafe.org/.
  19. European Union Agency for Cybersecurity (ENISA). Post-quantum cryptography: Preparing for the quantum era. White Paper, 2023.
  20. U.S. National Security Agency. Commercial National Security Algorithm Suite 2.0 and Quantum Computing Roadmap, 2022.
  21. UK National Cyber Security Centre. Next steps in preparing for post-quantum cryptography. White Paper, 2024.
  22. Reddy, T.; Tschofenig, H. Post-quantum cryptography recommendations for TLS-based applications. IETF Internet-Draft draft-ietf-uta-pqc-app-00, 2025.
  23. Gonzalez, R.; Wiggers, T. KEMTLS vs. post-quantum TLS: Performance on embedded systems. In Proceedings of the Proc. International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE), 2022.
  24. Lopez, J.; Cadena, V.; Rahman, M.S. Evaluating post-quantum cryptographic algorithms on resource-constrained devices. In Proceedings of the Proc. IEEE International Conference on Quantum Computing and Engineering (QCE), 2025.
Figure 1. HQRT protocol flow. ML-KEM operations (shaded) occur once at full-handshake time; the 0-RTT resumption incurs no additional ML-KEM cost.
Figure 1. HQRT protocol flow. ML-KEM operations (shaded) occur once at full-handshake time; the 0-RTT resumption incurs no additional ML-KEM cost.
Preprints 206958 g001
Figure 2. Resumption and handshake latency as a function of RTT. HQRT-0RTT tracks Classical-0RTT closely; full PQC/hybrid handshakes diverge rapidly with increasing RTT.
Figure 2. Resumption and handshake latency as a function of RTT. HQRT-0RTT tracks Classical-0RTT closely; full PQC/hybrid handshakes diverge rapidly with increasing RTT.
Preprints 206958 g002
Figure 3. Stacked bar decomposition of per-handshake computational cost. ML-KEM-768 operations are the dominant cost but remain 8 × cheaper than ML-DSA-44 verification.
Figure 3. Stacked bar decomposition of per-handshake computational cost. ML-KEM-768 operations are the dominant cost but remain 8 × cheaper than ML-DSA-44 verification.
Preprints 206958 g003
Figure 4. Empirical CDF of resumption latency at 50 ms RTT (1 000 trials). HQRT-0RTT exhibits a tight distribution shifted ≈ 1.3 ms from Classical-0RTT, with no heavy-tail divergence.
Figure 4. Empirical CDF of resumption latency at 50 ms RTT (1 000 trials). HQRT-0RTT exhibits a tight distribution shifted ≈ 1.3 ms from Classical-0RTT, with no heavy-tail divergence.
Preprints 206958 g004
Figure 5. Server throughput (ops/sec) vs. concurrent clients. HQRT-0RTT closely tracks Classical-0RTT; full PQC/hybrid handshakes degrade sharply.
Figure 5. Server throughput (ops/sec) vs. concurrent clients. HQRT-0RTT closely tracks Classical-0RTT; full PQC/hybrid handshakes degrade sharply.
Preprints 206958 g005
Figure 6. Peak and average CPU utilisation (%) at 1000 concurrent clients. HQRT-0RTT introduces negligible overhead over Classical-0RTT.
Figure 6. Peak and average CPU utilisation (%) at 1000 concurrent clients. HQRT-0RTT introduces negligible overhead over Classical-0RTT.
Preprints 206958 g006
Figure 7. Byte overhead per TLS message type. HQRT’s handshake overhead is comparable to Hybrid-Full but amortised across all subsequent 0-RTT resumptions.
Figure 7. Byte overhead per TLS message type. HQRT’s handshake overhead is comparable to Hybrid-Full but amortised across all subsequent 0-RTT resumptions.
Preprints 206958 g007
Figure 8. Amortised per-session overhead (ms) vs. number of resumptions following a single full handshake at 50 ms RTT. HQRT cost converges to near-zero within 5 sessions; PQC-Full overhead is constant.
Figure 8. Amortised per-session overhead (ms) vs. number of resumptions following a single full handshake at 50 ms RTT. HQRT cost converges to near-zero within 5 sessions; PQC-Full overhead is constant.
Preprints 206958 g008
Figure 9. Amortised per-session ML-KEM overhead across IoT device classes as a function of the number of resumptions.
Figure 9. Amortised per-session ML-KEM overhead across IoT device classes as a function of the number of resumptions.
Preprints 206958 g009
Table 1. Summary of related work on post-quantum TLS.
Table 1. Summary of related work on post-quantum TLS.
Work PQC Target 0-RTT Focus PKI Indep. Formal Proof
Stebila & Mosca [9] KE No Yes No
Paquin et al. [3] KE+Sig No Yes No
Sikeridis et al. [4] Sig No Yes No
KEMTLS [5] Auth No No Yes
Hybrid Draft [7] KE No Yes No
Alnahawi et al. [13] Survey No
HQRT(ours) Resum. Yes Yes Yes
KE = Key Exchange; Sig = Signatures; Auth = Authentication; Resum. = Resumption.
Table 2. HQRT message modifications and size impact.
Table 2. HQRT message modifications and size impact.
Message Classical HQRT Delta
ClientHello key_share 64 B 1248 B +1184 B
EncryptedExtensions (KEM) 0 B 2272 B +2272 B
CertificateVerify signature 72 B 72 B unchanged
NewSessionTicket 250 B 1338 B +1088 B
ClientHello (resumption) 350 B 354 B +4 B
Total full handshake overhead ≈3560 B
Total resumption overhead ≈4 B
Table 3. Implementation code footprint.
Table 3. Implementation code footprint.
Component Lines Modified Lines Added
Extension handlers (CH/EE) 48 386
Key schedule patch 31 142
NewSessionTicket extension 22 294
Test harness & validation 0 315
Total 101 1 137
Table 4. Per-connection runtime memory overhead.
Table 4. Per-connection runtime memory overhead.
State Component Classical HQRT Delta
X25519 ephemeral keys 64 B 64 B 0 B
ML-KEM-768 ek C 1 184 B +1 184 B
ML-KEM-768 dk C 2 400 B +2 400 B*
HRMS state per ticket 64 B +64 B
Session ticket blob 250 B 1 338 B +1 088 B
Peak per-connection 314 B 5 050 B +4 736 B
Steady-state (post-ticket) 250 B 1 402 B +1 152 B
* Deleted after NewSessionTicket receipt (forward secrecy).
Table 5. Resumption / handshake latency (ms) across RTT conditions. Values are means over 30 trials; 95% CI widths ± 3.2 % .
Table 5. Resumption / handshake latency (ms) across RTT conditions. Values are means over 30 trials; 95% CI widths ± 3.2 % .
Scheme 0 ms 20 ms 50 ms 100 ms 150 ms
Classical-0RTT 1.2 21.4 51.3 101.2 151.4
HQRT-0RTT 1.3 22.1 52.6 102.8 153.1
PQC-Full 28.4 76.3 128.7 228.5 328.9
Hybrid-Full 31.2 84.9 134.9 184.9 205.6
HQRT overhead +0.1 +0.7 +1.3 +1.6 +1.7
HQRT overhead (%) 8.3% 3.3% 2.5% 1.6% 1.1%
Table 6. Latency overhead decomposition of HQRT full handshake relative to classical TLS 1.3 ( μ s, Linux Xeon).
Table 6. Latency overhead decomposition of HQRT full handshake relative to classical TLS 1.3 ( μ s, Linux Xeon).
Sub-operation Time ( μ s) Share (%)
ML-KEM-768 KeyGen (client) 54 17.4
ML-KEM-768 Encaps (server) 68 21.9
ML-KEM-768 Decaps (client) 58 18.7
ML-KEM-768 Encaps (ticket) 68 21.9
ML-KEM-768 Decaps (ticket) 58 18.7
HKDF-Extract (HIKM) 4 1.3
Total HQRT overhead 310 100%
Table 7. Latency percentiles (ms) at 50 ms RTT, n = 1 , 000 trials.
Table 7. Latency percentiles (ms) at 50 ms RTT, n = 1 , 000 trials.
Scheme P25 P50 P75 P90 P95 P99
Classical-0RTT 50.8 51.3 51.9 52.4 52.8 54.1
HQRT-0RTT 52.0 52.6 53.2 53.8 54.3 55.6
PQC-Full 126.1 128.7 131.4 134.2 136.8 142.5
Hybrid-Full 132.3 134.9 137.6 140.8 143.1 149.7
Table 9. Average CPU utilisation (%) across concurrency levels (Linux).
Table 9. Average CPU utilisation (%) across concurrency levels (Linux).
Scheme 100 250 500 750 1000
Classical-0RTT 5.2 9.8 14.1 17.6 21.0
HQRT-0RTT 5.6 10.5 15.2 19.0 23.0
PQC-Full 18.4 31.2 44.8 52.1 58.0
Hybrid-Full 24.8 40.6 55.3 64.2 71.0
Table 10. Per-operation timing ( μ s) on server and client hardware.
Table 10. Per-operation timing ( μ s) on server and client hardware.
Operation Linux (Xeon) Windows (i7)
Mean P95 Mean P95
X25519 KeyGen 16 19 18 22
X25519 DH 49 55 54 60
ML-KEM-768 KeyGen 54 61 61 69
ML-KEM-768 Encaps 68 76 75 84
ML-KEM-768 Decaps 58 65 64 72
ECDSA P-256 Sign 89 102 97 111
ECDSA P-256 Verify 72 82 79 90
ML-DSA-44 Sign 890 980 960 1060
ML-DSA-44 Verify 2410 2650 2590 2840
HKDF-Extract 4 5 4 5
HKDF-Expand-Label 6 8 7 9
HQRT ticket total 310 345 338 375
ML-DSA-44 verify total 2490 2730 2680 2940
Table 11. Per-message size (bytes) by TLS message type.
Table 11. Per-message size (bytes) by TLS message type.
Message Classical HQRT Hybrid-Full Δ  (HQRT)
ClientHello 384 1568 384 +1184
EncryptedExtensions 80 2352 80 +2272
CertificateVerify 72 72 2492 0
NewSessionTicket 250 1338 250 +1088
ClientHello (resum.) 350 354 350 +4
Full HS total 786 5330 2956 +4544
Resumption total 350 354 350 +4
Table 12. Cumulative latency savings (ms) of HQRT vs. PQC-Full over N sessions at 50 ms RTT.
Table 12. Cumulative latency savings (ms) of HQRT vs. PQC-Full over N sessions at 50 ms RTT.
Metric N = 1 N = 5 N = 10 N = 25 N = 50
HQRT cumul. overhead (ms) 1.3 1.95 2.60 4.55 7.80
PQC-Full cumul. overhead (ms) 77.4 387 774 1935 3870
Saving (%) 98.3 99.5 99.7 99.8 99.8
Table 13. HQRT performance on representative IoT hardware (10-session model).
Table 13. HQRT performance on representative IoT hardware (10-session model).
Device ML-KEM HS 0-RTT Amort.
total (ms) overhead overhead gain
Xeon 4310 (server) 0.26 +0.26 ms +0 ms 97%
Core i7 (desktop) 0.30 +0.30 ms +0 ms 97%
Raspberry Pi 4 8.4 +8.4 ms +0 ms 92%
Low-power ARM SBC 21.6 +21.6 ms +0 ms 78%
Cortex-M33 185 +185 ms +0 ms 34%
Cortex-M4 490 +490 ms +0 ms 18%
Table 14. Estimated energy cost per cryptographic operation on IoT platforms.
Table 14. Estimated energy cost per cryptographic operation on IoT platforms.
Platform Operation Time (ms) Energy ( μ J)
Cortex-M33 ML-KEM KeyGen 32 4.8
ML-KEM Encaps 41 6.2
ML-KEM Decaps 35 5.3
HQRT total 185 27.8
Cortex-M4 ML-KEM KeyGen 85 25.5
ML-KEM Encaps 110 33.0
ML-KEM Decaps 92 27.6
HQRT total 490 147
Active power: Cortex-M33 ≈ 150  μ W/MHz at 100 MHz; Cortex-M4 ≈ 300  μ W/MHz at 100 MHz.
Table 15. Comparative analysis of post-quantum TLS approaches across key deployment dimensions.
Table 15. Comparative analysis of post-quantum TLS approaches across key deployment dimensions.
Property Classical PQC-Full Hybrid-Full KEMTLS Hybrid Draft HQRT
TLS 1.3 [3] [7] [5] [7] (ours)
HNDL-safe full HS ×
HNDL-safe 0-RTT × ×a ×a ×b ×a
No PKI changes ×
0-RTT latency overhead 0% N/A N/A N/A N/A 4–9%
Resumption round trips 0 1 1 1 1 0
Backward compatible Partial Full None Full Full
aProtects future full handshakes but does not address session tickets from prior sessions. bKEMTLS does not define a session ticket mechanism. ✓ = property satisfied; × = property not satisfied.
Table 16. Projected throughput (ops/sec) at production-scale concurrency.
Table 16. Projected throughput (ops/sec) at production-scale concurrency.
Scheme 2 500 5 000 10 000
Classical-0RTT 2960 2380 1680
HQRT-0RTT 2770 2230 1570
PQC-Full 580 480 350
Hybrid-Full 290 210 130
HQRT/Classical ratio 93.6% 93.7% 93.5%
HQRT/PQC-Full ratio 4.78× 4.65× 4.49×
Table 17. Composability of HQRT with PQC authentication schemes.
Table 17. Composability of HQRT with PQC authentication schemes.
Authentication HS HNDL-safe 0-RTT HNDL-safe
ECDSA + HQRT Partiala
ML-DSA-44 + HQRT
Hybrid sig. + HQRT
KEMTLS + HQRT b
aAuthentication forgeable post-Q-day but key material remains confidential. bRequires KEMTLS-compatible PKI; HQRT portion is PKI-independent.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated