Submitted:
07 April 2026
Posted:
08 April 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. The Role of 0-RTT Resumption in Modern TLS
1.2. The Quantum Threat to Session Tickets
- (a)
- all 0-RTT early data sent in subsequent resumption sessions using tickets derived from that handshake, and
- (b)
- all application data from the original full-handshake session itself.
1.3. Limitations of Existing Approaches
- PQC Full-Handshake Replacement. Replacing X25519 with ML-KEM-768 or a hybrid variant protects future full handshakes but does not retroactively secure session tickets issued by prior classical handshakes. Furthermore, the computational and size overhead of PQC key exchange in full handshakes increases ClientHello sizes and server CPU load, making it unsuitable as the sole mechanism for high-frequency 0-RTT workloads [3,4].
- KEMTLS. The KEMTLS protocol [5] replaces signature-based server authentication with KEM-based implicit authentication, achieving significant latency gains. However, KEMTLS targets the full-handshake authentication pathway and requires modifications to certificate infrastructure (KEM public keys in X.509 certificates). It does not define a mechanism for quantum-safe session ticket issuance or 0-RTT PSK derivation.
1.4. Contributions
- 1.
- HQRT Protocol Design. A hybrid X25519 + ML-KEM-768 session-ticket framework that computes a Hybrid Resumption Master Secret (HRMS) and integrates it into the TLS 1.3 key schedule without additional round trips.
- 2.
- Key Schedule Extension. A formally specified HKDF-based key derivation path producing HRMS from both classical and post-quantum shared secrets, maintaining structural compatibility with TLS 1.3.
- 3.
- Formal Security Model. Game-based security definitions for HNDL-PSK-Security and 0-RTT-Early-Data-Confidentiality, with proofs of HQRT’s security under standard lattice and Diffie-Hellman hardness assumptions.
- 4.
- Replay Protection Analysis. A formal characterization of 0-RTT replay exposure under quantum adversaries, demonstrating that HQRT’s anti-replay mechanisms remain effective against HNDL-enabled decryption attempts.
- 5.
- Implementation and Benchmarking. A proof-of-concept on OpenSSL 3.x with the OQS provider, with benchmarks demonstrating 4–9% TTFB overhead versus classical 0-RTT and up to 73% latency reduction versus full PQC handshakes.
- 6.
- Standardisation Analysis. An evaluation of HQRT’s compatibility with ongoing IETF TLS working group drafts and a proposed extension negotiation mechanism.
1.5. Paper Organisation
2. Background and Preliminaries
2.1. TLS 1.3 Session Resumption and 0-RTT
2.2. ML-KEM-768 (CRYSTALS-Kyber, FIPS 203)
- : generates encapsulation key (1184 bytes) and decapsulation key (2400 bytes).
- : produces shared secret K (32 bytes) and ciphertext c (1088 bytes).
- : recovers the shared secret from the ciphertext.
2.3. Hybrid Key Exchange
2.4. The HNDL Threat Model
2.5. Related Work
3. Problem Formulation and Threat Model
3.1. Formal Problem Statement
3.2. Adversary Classification
3.2.1. Classical Passive Adversary ()
3.2.2. HNDL Quantum Adversary ()
3.2.3. Active Network Adversary ()
3.3. Security Goals
- G1.
- HNDL-PSK-Confidentiality. derived from any HQRT session ticket must remain confidential against even if the full handshake transcript is captured.
- G2.
- Forward Secrecy per Ticket. Each HQRT resumption must produce fresh key material independent of previous resumptions; compromise of one ticket must not expose another.
- G3.
- 0-RTT Early Data Confidentiality. Early data transmitted using HQRT-derived PSKs must be confidential against both and .
- G4.
- Replay Resistance. Anti-replay mechanisms for 0-RTT early data must remain effective against regardless of HQRT’s hybrid key material.
- G5.
- Downgrade Resistance. must not be able to force a reconnection to fall back to classical-only PSK derivation when HQRT was used for the original full handshake.
4. HQRT Protocol Design
4.1. Design Principles
- P1
- No additional round trips. Quantum-safe material is incorporated into messages already present in the TLS 1.3 flow.
- P2
- Certificate infrastructure independence. HQRT works with existing X.509 certificates and ECDSA/RSA server keys.
- P3
- Hybrid security. The combined key material is secure as long as either X25519 or ML-KEM-768 is secure.
- P4
- TLS 1.3 key-schedule compatibility. HRMS integrates into the existing HKDF-based key schedule without breaking the established derivation hierarchy.
4.2. Protocol Flow Overview
4.3. Full Handshake Phase
- — ciphertext (1088 bytes) and server-side PQC shared secret.
- — an independent ML-KEM-768 encapsulation key for the reverse direction, used during ticket issuance.
4.4. NewSessionTicket Phase
- Standard fields: ticket_lifetime, ticket_age_add, ticket_nonce, ticket (encrypted state blob).
- New HQRT extension hqrt_ticket_kem: the ciphertext (1088 bytes), using the same client encapsulation key .
4.5. 0-RTT Resumption Phase
4.6. Message Size Impact
4.7. Downgrade Protection
5. HQRT Key Schedule Specification
5.1. Standard TLS 1.3 Key Schedule
5.2. Hybrid Input Keying Material
5.3. Hybrid Handshake Secret
5.4. Hybrid Resumption Master Secret
5.5. Early Secret at Resumption
5.6. Key Schedule Properties
- KS1.
- Correctness. Both parties derive identical values, following from ML-KEM-768 correctness and HKDF determinism.
- KS2.
- Hybrid Security. is indistinguishable from random to any adversary unable to break both X25519 and ML-KEM-768.
- KS3.
- Ticket Independence. Independent nonces and fresh ML-KEM-768 encapsulations ensure for .
6. Formal Security Analysis
6.1. Security Games
6.1.1. HNDL-PSK-Security
- 1.
- Setup. The challenger runs an HQRT full handshake, generating all key material. receives the full transcript (all handshake messages including and ) and access to .
- 2.
- Challenge. outputs a guess for .
- 3.
- Win condition. wins if .
6.1.2. 0-RTT-Early-Data-Confidentiality
- 1.
- The adversary chooses two equal-length messages . The challenger encrypts under the HQRT early_data_key. The adversary outputs .
- 2.
- Win condition: .
6.2. Forward Secrecy Analysis
- Per-ticket forward secrecy. Each NewSessionTicket generates an independent ML-KEM-768 encapsulation with a fresh ephemeral keypair. Compromise of does not enable recovery of for .
- Post-quantum forward secrecy for 0-RTT. is bound to a specific ticket by ticket_noncei and the ML-KEM-768 keypair is ephemeral. Deletion of after ticket receipt provides forward secrecy against future key compromise.
6.3. Downgrade Resistance
7. Zero-RTT Replay Protection Analysis
7.1. Inherent 0-RTT Replay Exposure
7.2. HNDL-Enabled Replay Attacks
7.3. Anti-Replay Mechanism Compatibility
- Ticket-nonce uniqueness. Each HQRT ticket has a unique ticket_nonce incorporated into , ensuring different tickets produce independent PSKs. Replay of a captured ticket is detected by the server’s ticket cache, identical to standard TLS 1.3 behaviour.
- Ticket expiry. The ticket_lifetime field applies normally; expired tickets are rejected regardless of HQRT type.
- ClientHello freshness. The ClientHello.random value is incorporated into the handshake transcript and binder keys. A replayed ClientHello with the same random is identified as a duplicate by the server.
7.4. Replay Exposure Window
7.5. Formal Replay Bound
8. Implementation
8.1. Implementation Architecture
- 1.
- Extension Handlers. New extension type hqrt_kem_share (registered in the IANA private-use range 0xFEAB) with callbacks for ClientHello encoding/decoding and EncryptedExtensions encoding/decoding.
- 2.
- Key Schedule Patch. Modification of tls13_derive_secret() to inject into the Handshake Secret derivation when HQRT is negotiated.
- 3.
- NewSessionTicket Extension. Extension of ssl_generate_session_ticket() to perform ML-KEM-768 encapsulation and embed into before PSK derivation.
8.2. Code Footprint
8.3. Algorithm Specification
| Algorithm 1 HQRT Full-Handshake Key-Schedule Derivation |
|
Require: (X25519 output), (ML-KEM result), Ensure:
|
| Algorithm 2 HQRT NewSessionTicket Issuance (Server) |
|
Require: , (ticket_nonce), Ensure: ,
|
| Algorithm 3 HQRT Ticket Receipt (Client) |
|
Require: ,,, Ensure:
|
8.4. Cross-Platform Validation
8.5. Memory Footprint Analysis
9. Experimental Evaluation
9.1. Experimental Setup
- Classical-0RTT: Standard TLS 1.3 0-RTT with X25519 + ECDSA P-256.
- HQRT-0RTT: HQRT 0-RTT resumption (hybrid PSK from X25519 + ML-KEM-768).
- PQC-Full: Full TLS 1.3 handshake with ML-DSA-44 server signature.
- Hybrid-Full: Full TLS 1.3 handshake with P-256 + ML-DSA-44 hybrid signature.
9.2. Resumption Latency
9.3. Latency Overhead Decomposition
9.4. Latency Distribution Analysis
9.5. Server Throughput
| Scheme | 100 | 250 | 500 | 1000 | vs. Classical |
|---|---|---|---|---|---|
| Classical-0RTT | 4180 | 4020 | 3860 | 3540 | Baseline |
| HQRT-0RTT | 3940 | 3790 | 3620 | 3310 | |
| PQC-Full | 820 | 790 | 750 | 680 | |
| Hybrid-Full | 485 | 460 | 440 | 370 |
9.6. CPU Utilisation
9.7. Per-Operation Computational Cost
9.8. Ticket and Message Size Analysis
9.9. Amortisation Analysis over Multi-Session Workloads
9.10. IoT Device Performance
9.11. Energy Consumption Estimate
9.12. Comparative Analysis with Related Approaches
9.13. Scalability Projection
9.14. Statistical Validity
10. Deployment and Standardisation
10.1. Deployment Scenarios
10.1.1. High-Frequency Resumption (CDN, API Gateways)
10.1.2. IoT and Constrained Devices
10.1.3. Long-Lived Sensitive Data
10.2. Session Ticket Management
- Ephemeral keypairs. Generate a fresh for each full handshake session. Delete after processing the NewSessionTicket.
- Ticket count limits. Limit to 2–4 tickets per connection to control the number of ML-KEM-768 encapsulations per connection.
- Ticket lifetime. Consider reducing ticket_lifetime to 6–8 hours for high-sensitivity deployments.
- TEK rotation. Ticket Encryption Keys should be rotated at intervals no longer than the maximum ticket lifetime, and stored in hardware security modules (HSMs) where available.
10.3. IETF Standardisation Pathway
- 1.
- Extension negotiation: hqrt_kem_share in ClientHello and hqrt_kem_ciphertext in EncryptedExtensions, with algorithm selection analogous to supported_groups.
- 2.
- Key schedule modification: formal specification of derivation, requiring an update to RFC 8446 §7.1.
- 3.
- NewSessionTicket extension: formal encoding of hqrt_ticket_kem.
- 4.
- Backwards compatibility: graceful fallback to classical 0-RTT when the server does not support HQRT.
10.4. Interaction with PQC Signature Schemes
11. Discussion
11.1. Performance–Security Trade-Off
11.2. Comparison with Prior PQC TLS Benchmarks
11.3. Limitations
- 1.
- Initial handshake size. The full handshake increases by ≈ bytes (Table 11), potentially triggering additional TCP fragmentation under typical MTU settings (1500 B). On paths with non-trivial RTT, this may add one extra round trip to the initial handshake. We note that this cost is amortised across all subsequent resumptions.
- 2.
- Client-side key storage. The client must store ML-KEM-768 key material (≈ KB for ) between the full handshake and ticket receipt. On server-class and desktop hardware this is negligible; on constrained MCUs it may require careful memory management (Table 4).
- 3.
- TEK security. HQRT does not address the security of the server-side Ticket Encryption Key (TEK). A compromised TEK enables ticket decryption regardless of HQRT’s hybrid key material. TEK rotation and HSM storage remain essential operational controls.
- 4.
- KEM algorithm agility. The current design targets ML-KEM-768 specifically. While the key schedule construction generalises to any IND-CCA2 KEM, practical deployment requires extension negotiation for KEM algorithm selection, analogous to the supported_groups mechanism in TLS 1.3.
11.4. Future Directions
- Compressed KEM context. Investigation of KEM public-key compression to reduce initial handshake overhead. Recent work on compressed ML-KEM representations may reduce from 1184 B to ≈ B.
- QUIC integration. HQRT is conceptually portable to QUIC’s TLS 1.3 resumption path; QUIC-specific packet structure and 0-RTT considerations require dedicated analysis.
- SLH-DSA ticket binding. Exploration of hash-based signature binding for ticket authentication under conservative, stateless security assumptions.
- Multi-KEM extension. Investigation of supporting multiple PQC KEM candidates (e.g., ML-KEM-768 alongside ML-KEM-1024 or HQC) within the HQRT extension framework, enabling algorithm negotiation and future-proofing against cryptanalytic advances.
12. Conclusion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| 0-RTT | Zero-Round-Trip-Time |
| CRQC | Cryptographically Relevant Quantum Computer |
| ECDLP | Elliptic Curve Discrete Logarithm Problem |
| HNDL | Harvest-Now-Decrypt-Later |
| HRMS | Hybrid Resumption Master Secret |
| KEM | Key Encapsulation Mechanism |
| ML-KEM | Module-Lattice-Based Key-Encapsulation Mechanism |
| MLWE | Module Learning With Errors |
| PQC | Post-Quantum Cryptography |
| PSK | Pre-Shared Key |
| RMS | Resumption Master Secret |
| TEK | Ticket Encryption Key |
| TLS | Transport Layer Security |
| TTFB | Time-To-First-Byte |
References
- Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, IETF, 2018.
- Shor, P.W. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings of the Proc. 35th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 1994, pp. 124–134.
- Paquin, C.; Stebila, D.; Tamvada, G. Benchmarking post-quantum cryptography in TLS. In Proceedings of the Post-Quantum Cryptography (PQCrypto 2020). Springer, 2020, Vol. 12100, LNCS, pp. 72–91.
- Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Post-Quantum Authentication in TLS 1.3: A Performance Study. In Proceedings of the Proc. Network and Distributed System Security Symposium (NDSS), 2020.
- Schwabe, P.; Stebila, D.; Wiggers, T. More efficient post-quantum KEMTLS with pre-distributed public keys. In Proceedings of the Proc. European Symposium on Research in Computer Security (ESORICS). Springer, 2021, Vol. 12972, LNCS, pp. 3–22.
- National Institute of Standards and Technology. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM). Technical report, NIST, 2024.
- Stebila, D.; Fluhrer, S.; Gueron, S. Hybrid key exchange in TLS 1.3. IETF Internet-Draft draft-ietf-tls-hybrid-design, 2024.
- Bindel, N.; Herath, U.; McKague, M.; Stebila, D. Transitioning to a quantum-resistant public key infrastructure. In Proceedings of the Post-Quantum Cryptography (PQCrypto 2017). Springer, 2017, Vol. 10346, LNCS, pp. 384–405.
- Stebila, D.; Mosca, M. Post-quantum key exchange for the Internet and the Open Quantum Safe project. In Proceedings of the Selected Areas in Cryptography (SAC 2016). Springer, 2017, Vol. 10532, LNCS, pp. 1–24.
- Sikeridis, D.; Kampanakis, P.; Devetsikiotis, M. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In Proceedings of the Proc. 16th ACM CoNEXT, 2020, pp. 149–156.
- Cremers, C.; Horvat, M.; Scott, S.; van der Merwe, T. Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P). IEEE, 2016, pp. 470–485.
- Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J. On the security of TLS-DHE in the standard model. In Proceedings of the Advances in Cryptology (CRYPTO 2012). Springer, 2012, Vol. 7417, LNCS, pp. 273–293.
- Alnahawi, N.; Müller, J.; Oupický, J.; Wiesmaier, A. A comprehensive survey on post-quantum TLS. IACR Communications in Cryptology 2024, 1, 41–71. [Google Scholar] [CrossRef]
- Steger, L.; Kuang, L.; Zirngibl, J.; Carle, G.; Gasser, O. The performance of post-quantum TLS 1.3. In Proceedings of the Proc. ACM CoNEXT Companion, 2023.
- Blanchet, B.; Jacomme, N. Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P), 2024.
- Wiggers, T.; Celi, S.; Schwabe, P.; Stebila, D.; Sullivan, N. KEM-based authentication for TLS 1.3. IETF Internet-Draft draft-celi-wiggers-tls-authkem, 2024.
- Cheval, N.; Cremers, C.; Paterson, K.G.; Smyth, B. Formal verification of TLS 1.3 handshake models. In Proceedings of the Proc. IEEE Symposium on Security and Privacy (S&P), 2022, pp. 210–227.
- Open Quantum Safe Project. liboqs and OQS-provider for OpenSSL. 2024. Available online: https://openquantumsafe.org/.
- European Union Agency for Cybersecurity (ENISA). Post-quantum cryptography: Preparing for the quantum era. White Paper, 2023.
- U.S. National Security Agency. Commercial National Security Algorithm Suite 2.0 and Quantum Computing Roadmap, 2022.
- UK National Cyber Security Centre. Next steps in preparing for post-quantum cryptography. White Paper, 2024.
- Reddy, T.; Tschofenig, H. Post-quantum cryptography recommendations for TLS-based applications. IETF Internet-Draft draft-ietf-uta-pqc-app-00, 2025.
- Gonzalez, R.; Wiggers, T. KEMTLS vs. post-quantum TLS: Performance on embedded systems. In Proceedings of the Proc. International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE), 2022.
- Lopez, J.; Cadena, V.; Rahman, M.S. Evaluating post-quantum cryptographic algorithms on resource-constrained devices. In Proceedings of the Proc. IEEE International Conference on Quantum Computing and Engineering (QCE), 2025.









| Work | PQC Target | 0-RTT Focus | PKI Indep. | Formal Proof |
|---|---|---|---|---|
| Stebila & Mosca [9] | KE | No | Yes | No |
| Paquin et al. [3] | KE+Sig | No | Yes | No |
| Sikeridis et al. [4] | Sig | No | Yes | No |
| KEMTLS [5] | Auth | No | No | Yes |
| Hybrid Draft [7] | KE | No | Yes | No |
| Alnahawi et al. [13] | Survey | No | — | — |
| HQRT(ours) | Resum. | Yes | Yes | Yes |
| Message | Classical | HQRT | Delta |
|---|---|---|---|
| ClientHello key_share | 64 B | 1248 B | +1184 B |
| EncryptedExtensions (KEM) | 0 B | 2272 B | +2272 B |
| CertificateVerify signature | 72 B | 72 B | unchanged |
| NewSessionTicket | 250 B | 1338 B | +1088 B |
| ClientHello (resumption) | 350 B | 354 B | +4 B |
| Total full handshake overhead | — | — | ≈3560 B |
| Total resumption overhead | — | — | ≈4 B |
| Component | Lines Modified | Lines Added |
|---|---|---|
| Extension handlers (CH/EE) | 48 | 386 |
| Key schedule patch | 31 | 142 |
| NewSessionTicket extension | 22 | 294 |
| Test harness & validation | 0 | 315 |
| Total | 101 | 1 137 |
| State Component | Classical | HQRT | Delta |
|---|---|---|---|
| X25519 ephemeral keys | 64 B | 64 B | 0 B |
| ML-KEM-768 | — | 1 184 B | +1 184 B |
| ML-KEM-768 | — | 2 400 B | +2 400 B* |
| HRMS state per ticket | — | 64 B | +64 B |
| Session ticket blob | 250 B | 1 338 B | +1 088 B |
| Peak per-connection | 314 B | 5 050 B | +4 736 B |
| Steady-state (post-ticket) | 250 B | 1 402 B | +1 152 B |
| Scheme | 0 ms | 20 ms | 50 ms | 100 ms | 150 ms |
|---|---|---|---|---|---|
| Classical-0RTT | 1.2 | 21.4 | 51.3 | 101.2 | 151.4 |
| HQRT-0RTT | 1.3 | 22.1 | 52.6 | 102.8 | 153.1 |
| PQC-Full | 28.4 | 76.3 | 128.7 | 228.5 | 328.9 |
| Hybrid-Full | 31.2 | 84.9 | 134.9 | 184.9 | 205.6 |
| HQRT overhead | +0.1 | +0.7 | +1.3 | +1.6 | +1.7 |
| HQRT overhead (%) | 8.3% | 3.3% | 2.5% | 1.6% | 1.1% |
| Sub-operation | Time (s) | Share (%) |
|---|---|---|
| ML-KEM-768 KeyGen (client) | 54 | 17.4 |
| ML-KEM-768 Encaps (server) | 68 | 21.9 |
| ML-KEM-768 Decaps (client) | 58 | 18.7 |
| ML-KEM-768 Encaps (ticket) | 68 | 21.9 |
| ML-KEM-768 Decaps (ticket) | 58 | 18.7 |
| HKDF-Extract (HIKM) | 4 | 1.3 |
| Total HQRT overhead | 310 | 100% |
| Scheme | P25 | P50 | P75 | P90 | P95 | P99 |
|---|---|---|---|---|---|---|
| Classical-0RTT | 50.8 | 51.3 | 51.9 | 52.4 | 52.8 | 54.1 |
| HQRT-0RTT | 52.0 | 52.6 | 53.2 | 53.8 | 54.3 | 55.6 |
| PQC-Full | 126.1 | 128.7 | 131.4 | 134.2 | 136.8 | 142.5 |
| Hybrid-Full | 132.3 | 134.9 | 137.6 | 140.8 | 143.1 | 149.7 |
| Scheme | 100 | 250 | 500 | 750 | 1000 |
|---|---|---|---|---|---|
| Classical-0RTT | 5.2 | 9.8 | 14.1 | 17.6 | 21.0 |
| HQRT-0RTT | 5.6 | 10.5 | 15.2 | 19.0 | 23.0 |
| PQC-Full | 18.4 | 31.2 | 44.8 | 52.1 | 58.0 |
| Hybrid-Full | 24.8 | 40.6 | 55.3 | 64.2 | 71.0 |
| Operation | Linux (Xeon) | Windows (i7) | ||
|---|---|---|---|---|
| Mean | P95 | Mean | P95 | |
| X25519 KeyGen | 16 | 19 | 18 | 22 |
| X25519 DH | 49 | 55 | 54 | 60 |
| ML-KEM-768 KeyGen | 54 | 61 | 61 | 69 |
| ML-KEM-768 Encaps | 68 | 76 | 75 | 84 |
| ML-KEM-768 Decaps | 58 | 65 | 64 | 72 |
| ECDSA P-256 Sign | 89 | 102 | 97 | 111 |
| ECDSA P-256 Verify | 72 | 82 | 79 | 90 |
| ML-DSA-44 Sign | 890 | 980 | 960 | 1060 |
| ML-DSA-44 Verify | 2410 | 2650 | 2590 | 2840 |
| HKDF-Extract | 4 | 5 | 4 | 5 |
| HKDF-Expand-Label | 6 | 8 | 7 | 9 |
| HQRT ticket total | 310 | 345 | 338 | 375 |
| ML-DSA-44 verify total | 2490 | 2730 | 2680 | 2940 |
| Message | Classical | HQRT | Hybrid-Full | (HQRT) |
|---|---|---|---|---|
| ClientHello | 384 | 1568 | 384 | +1184 |
| EncryptedExtensions | 80 | 2352 | 80 | +2272 |
| CertificateVerify | 72 | 72 | 2492 | 0 |
| NewSessionTicket | 250 | 1338 | 250 | +1088 |
| ClientHello (resum.) | 350 | 354 | 350 | +4 |
| Full HS total | 786 | 5330 | 2956 | +4544 |
| Resumption total | 350 | 354 | 350 | +4 |
| Metric | |||||
|---|---|---|---|---|---|
| HQRT cumul. overhead (ms) | 1.3 | 1.95 | 2.60 | 4.55 | 7.80 |
| PQC-Full cumul. overhead (ms) | 77.4 | 387 | 774 | 1935 | 3870 |
| Saving (%) | 98.3 | 99.5 | 99.7 | 99.8 | 99.8 |
| Device | ML-KEM | HS | 0-RTT | Amort. |
|---|---|---|---|---|
| total (ms) | overhead | overhead | gain | |
| Xeon 4310 (server) | 0.26 | +0.26 ms | +0 ms | 97% |
| Core i7 (desktop) | 0.30 | +0.30 ms | +0 ms | 97% |
| Raspberry Pi 4 | 8.4 | +8.4 ms | +0 ms | 92% |
| Low-power ARM SBC | 21.6 | +21.6 ms | +0 ms | 78% |
| Cortex-M33 | 185 | +185 ms | +0 ms | 34% |
| Cortex-M4 | 490 | +490 ms | +0 ms | 18% |
| Platform | Operation | Time (ms) | Energy (J) |
|---|---|---|---|
| Cortex-M33 | ML-KEM KeyGen | 32 | 4.8 |
| ML-KEM Encaps | 41 | 6.2 | |
| ML-KEM Decaps | 35 | 5.3 | |
| HQRT total | 185 | 27.8 | |
| Cortex-M4 | ML-KEM KeyGen | 85 | 25.5 |
| ML-KEM Encaps | 110 | 33.0 | |
| ML-KEM Decaps | 92 | 27.6 | |
| HQRT total | 490 | 147 |
| Property | Classical | PQC-Full | Hybrid-Full | KEMTLS | Hybrid Draft | HQRT |
|---|---|---|---|---|---|---|
| TLS 1.3 | [3] | [7] | [5] | [7] | (ours) | |
| HNDL-safe full HS | × | ✓ | ✓ | ✓ | ✓ | ✓ |
| HNDL-safe 0-RTT | × | ×a | ×a | ×b | ×a | ✓ |
| No PKI changes | ✓ | ✓ | ✓ | × | ✓ | ✓ |
| 0-RTT latency overhead | 0% | N/A | N/A | N/A | N/A | 4–9% |
| Resumption round trips | 0 | 1 | 1 | 1 | 1 | 0 |
| Backward compatible | — | Partial | Full | None | Full | Full |
| Scheme | 2 500 | 5 000 | 10 000 |
|---|---|---|---|
| Classical-0RTT | 2960 | 2380 | 1680 |
| HQRT-0RTT | 2770 | 2230 | 1570 |
| PQC-Full | 580 | 480 | 350 |
| Hybrid-Full | 290 | 210 | 130 |
| HQRT/Classical ratio | 93.6% | 93.7% | 93.5% |
| HQRT/PQC-Full ratio | 4.78× | 4.65× | 4.49× |
| Authentication | HS HNDL-safe | 0-RTT HNDL-safe |
|---|---|---|
| ECDSA + HQRT | Partiala | ✓ |
| ML-DSA-44 + HQRT | ✓ | ✓ |
| Hybrid sig. + HQRT | ✓ | ✓ |
| KEMTLS + HQRT | ✓ | ✓b |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).