Design and Evaluation of Quantum-Resilient Cryptographic Protocols for National Information Systems Security

Authors

  • Emmanuel Philip Nittala Principal Quality Expert - SAP Labs (Ariba). Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V5I2P114

Keywords:

Quantum-Resilient Cryptography, Post-Quantum Cryptography, Lattice-Based Encryption, National Information Security, Quantum Key Distribution, NIST PQC, Cybersecurity

Abstract

The rapid progress of quantum computing now poses a substantial security risk to the information infrastructures of various nations, which are fundamentally reliant on classical cryptographic systems. Encryption algorithms such as RSA, ECC, and, notably, Satyamani’s, Shor, and Grover algorithms are vulnerable to quantum attacks; indeed, these algorithms can compromise code creation and encryption protocols within seconds when subjected to powerful quantum computing devices. In response to this emerging threat, this paper presents the design and evaluation of a quantum-resilient cryptographic protocol suite intended for national information systems security. The proposed version integrates lattice-based key exchange and hash-based digital signatures, rendering it post-quantum and compatible with the existing Public Key Infrastructure (PKI) and network protocol stack. Formal security analysis and performance evaluation were conducted using simulated nationwide network environments. Experimental results demonstrate that the proposed scheme achieves a computational latency reduction of up to 45% compared to baseline post-quantum algorithms, while maintaining high resilience against both classical and quantum adversaries. The scalability test indicates that quantum-resilient cryptography can be deployed across various government apparatuses, promoting national cybersecurity and digital autonomy, while maintaining security and interoperability

Downloads

Download data is not yet available.

References

[1] Alagic, G., Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., ... & Smith-Tone, D. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process.

[2] Stelzer, T., Oberhansl, F., Schupp, J., & Karl, P. (2023, November). Enabling lattice-based post-quantum cryptography on the opentitan platform. In Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security (pp. 51-60).

[3] Lei, D., He, D., Peng, C., Luo, M., Liu, Z., & Huang, X. (2023). Faster implementation of ideal lattice-based cryptography using avx512. ACM Transactions on Embedded Computing Systems, 22(5), 1-18.

[4] Lovic, V. (2020). Quantum key distribution: Advantages, challenges and policy.

[5] Lee, C. C., Tan, T. G., Sharma, V., & Zhou, J. (2021, June). Quantum computing threat modelling on a generic cps setup. In International Conference on Applied Cryptography and Network Security (pp. 171-190). Cham: Springer International Publishing.

[6] Tan¹, T. G., & Sharma, V. (2021, July). Quantum Computing Threat Modelling. In Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Vol. 12809, p. 171). Springer Nature.

[7] Kumar, A., Ottaviani, C., Gill, S. S., & Buyya, R. (2022). Securing the future internet of things with post‐quantum cryptography. Security and Privacy, 5(2), e200.

[8] Giron, A. A. (2023). Hybrid post-quantum cryptography in network protocols.

[9] Aladwani, A. M. (2002). An integrated performance model information systems projects. Journal of management information systems, 19(1), 185-210.

[10] Panetto, H., & Cecil, J. (2013). Information systems for enterprise integration, interoperability and networking: theory and applications. Enterprise Information Systems, 7(1), 1-6.

[11] Panda, M. (2016, October). Performance analysis of encryption algorithms for security. In 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (pp. 278-284). IEEE.

[12] Farooq, S., Altaf, A., Iqbal, F., Thompson, E. B., Vargas, D. L. R., Díez, I. D. L. T., & Ashraf, I. (2023). Resilience optimization of post-quantum cryptography key encapsulation algorithms. Sensors, 23(12), 5379.

[13] Halak, B., Yilmaz, Y., & Shiu, D. (2022). Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications. Ieee Access, 10, 76707-76719.

[14] Borges, F., Reis, P. R., & Pereira, D. (2020). A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access, 8, 142413-142422.

[15] Public Key Cryptography — J. R. Nechvatal. NIST Special Publication SP 800-2, April 1991.

[16] Chen, L., Jordan, S., Liu, Y-K., Moody, D., Peralta, R., Perlner, R. & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography. NISTIR 8105, National Institute of Standards and Technology.

[17] Basu, K., Soni, D., Nabeel, M., & Karri, R. (2019). NIST Post-Quantum Cryptography – A Hardware Evaluation Study. Cryptology ePrint Archive 2019/047.

[18] Hekkala, J., Muurman, M., Halunen, K., et al. (2023). Implementing Post-quantum Cryptography for Developers. SN Computer Science, 4, 365.

[19] Akter, M. S. (2023). Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.

[20] New Directions in Cryptography — W. Diffie & M. E. Hellman. IEEE Transactions on Information Theory, Vol. 22, No.6, Nov 1976, pp 644-654.

[21] A Method for Obtaining Digital Signatures and Public Key Cryptosystems — R. L. Rivest, A. Shamir & L. Adleman. Communications of the ACM, Vol 21(2), Feb 1978, pp 120-126.

Published

2024-06-30

Issue

Section

Articles

How to Cite

1.
Nittala EP. Design and Evaluation of Quantum-Resilient Cryptographic Protocols for National Information Systems Security. IJETCSIT [Internet]. 2024 Jun. 30 [cited 2025 Nov. 8];5(2):132-4. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/460

Similar Articles

11-20 of 310

You may also start an advanced similarity search for this article.