ESP32-S3 Introduces Post-Quantum Encryption via Aethyr Edge Node Open-Source Firmware

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Aethyr Research Unveils Post-Quantum Encrypted IoT Firmware for ESP32-S3

Aethyr Research has unveiled cutting-edge post-quantum encrypted firmware for Internet of Things (IoT) edge nodes targeting the ESP32-S3 architecture.

This firmware is notable for its rapid boot time of merely 2.1 seconds, while facilitating comprehensive post-quantum cryptography (PQC) handshakes within a commendable 35 milliseconds.

The ascendancy of quantum computing necessitates a reevaluation of traditional public-key cryptographic algorithms, like RSA and ECC, as these can be dismantled within hours to days through Shor’s algorithm.

Recognizing the urgency of this transition, Google has proposed a timeline for migrating to post-quantum cryptography by 2029.

This proactive measure accounts for the potential for data to be compromised during the interim period before sufficiently powerful quantum computers become operational.

Furthermore, the NIST FIPS 203 standard (ML-KEM-768) mandates quantum-resistant security by 2035.

The Aethyr Edge Node firmware is grounded in formally verified ML-KEM-768 (FIPS 203) key exchange, utilizing BLAKE3 for integrity verification and employing XChaCha20-Poly1305 encryption.

This suite of technologies enables secure connections to servers via the AethyrWire Protocol (AWP). This architecture serves as a foundational element of the Aethyr distributed agent mesh, designed to deploy autonomous AI agents across a mesh network, thereby minimizing reliance on cloud computing.

Currently, the open-source aspect encompasses only the ESP32-S3 firmware, while other components of the Aethyr agent operating system remain proprietary.

Performance Insights

The incorporation of post-quantum resistant algorithms may introduce certain latencies; however, preliminary benchmarks conducted on the ESP32-S3-WROOM-1, powered by a 240 MHz CPU, indicate overall satisfactory performance. Below are highlighted operational metrics:

OperationMeanStdDevMinMax
BLAKE3 (1KB)255µs102µs238µs969µs
ML-KEM keygen9,052µs164µs8,986µs9,558µs
ML-KEM encap10,070µs11µs10,058µs10,146µs
ML-KEM decap12,197µs11µs12,192µs12,275µs
XChaCha20 encrypt243µs46µs235µs564µs
BLAKE3 KDF49µs60µs40µs472µs
AWP frame enc+dec363µs95µs346µs1,030µs

Firmware Specifications

With an operational footprint of 833KB, the firmware maintains a free heap of 157KB from a total of 512KB of SRAM during runtime.

Rigorous testing has been conducted, comprising 410,000 fuzz iterations (AddressSanitizer + UBSan) that resulted in no crashes, alongside 100,000 single-bit-flip tests — all successfully detected. Moreover, the firmware performs 13 self-checks upon each boot.

The implementation has been assessed on ESP32-S3-WROOM-1 modules integrated with 8MB PSRAM, functioning in conjunction with an NVIDIA Jetson Orin Nano Super operating as a 2.4 GHz WiFi access point.

The firmware is compatible with any ESP32-S3 boards, and developers can clone the code repository, configure settings, compile, and flash the firmware using the following commands (ESP-IDF v5.4+ required):

git clone https://github.com/aethyrai/esp32-awp-edge
cd esp32-awp-edge

# Configure WiFi and upstream node
idf.py menuconfig
# → AWP Edge Node Configuration
#   WiFi SSID / Password
#   Upstream host IP and port

idf.py build
idf.py -p /dev/ttyUSB0 flash monitor
  

Self-Test Outputs

The following results summarize the output from the self-test suite:

Crypto Self-Test Suite
  [1] BLAKE3: empty input...                           PASS
  [2] BLAKE3: 251 sequential bytes...                  PASS
  [3] BLAKE3: derive_key (KDF mode)...                 PASS
  [4] XChaCha20-Poly1305: encrypt/decrypt round-trip...PASS
  [5] XChaCha20-Poly1305: tamper detection...          PASS
  [6] XChaCha20-Poly1305: wrong key rejection...       PASS
  [7] XChaCha20-Poly1305: nonce uniqueness...          PASS
  [8] ML-KEM-768: keygen + encap/decap round-trip...   PASS
  [9] ML-KEM-768: wrong secret key rejection...        PASS
  [10] INTEROP: BLAKE3 KDF matches Python...           PASS
  [11] INTEROP: decrypt Python-produced ciphertext...  PASS
  [12] AWP: frame encode/decode round-trip...          PASS
  [13] AWP: BLAKE3 checksum tamper detection...        PASS
  ALL 13 TESTS PASSED (226ms)
  
ML-KEM-768 keypair ready
WiFi connected
TCP connected to upstream
PQC session established
  
a white dice with a black github logo on it

For those interested in the code and detailed instructions, the repository is available on GitHub. However, an operational system image or pertinent software for installation on the Jetson board appears to be absent, limiting immediate utility. Notably, the Jetson and Demo directories have yet to be uploaded to GitHub:

── jetson/
│   ├── setup-mesh-ap.sh       Create dedicated WiFi AP on Jetson
│   ├── stop-mesh-ap.sh        Stop mesh AP
│   └── aios-node.service      systemd service for AWP node
├── demo/
│   └── run_demo.py            Scripted 2-minute demo
  

Source link: Cnx-software.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading