10.25673/122804 ">


Proceedings of International Conference on Applied Innovation in IT
2025/12/22 , Volume 13 , Issue 5 , pp.29 -40

Securing the Post-Quantum Internet: A Comparative Study of Quantum-Resistant Protocols and Migration Strategies


Esraa Saleh Alomari, Manar Bashar Mortatha Alkorani and Kamal Alieyan


Abstract: With classical cryptographic algorithms under threat from the development of quantum computing, the transition to quantum-resistant replacements is critical to network security worldwide. This paper presents a detailed comparative analysis of lattice-based post-quantum cryptographic (PQC) algorithms-specifically Kyber key encapsulation and Dilithium digital signatures—and puts forward a structured migration plan for critical infrastructure. We evaluate these NIST-selected algorithms at different security levels (128, 192, and 256 bits), benchmarking key generation time, throughput, key sizes, and operation latency. Our integration demonstrates transparent incorporation of these algorithms into TLS 1.3 and SSH protocols with 100% handshake success rates. Performance results indicate Kyber achieves 3-4× higher throughput (800-1150 ops/sec) and significantly smaller key sizes than Dilithium, with both offering similar security levels against quantum attacks. Furthermore, we provide an overall migration plan analysis, estimating an average implementation duration of 10.4 months per system type and total migration costs of approximately $724,122, in which databases require the largest amount of adjustment. Our findings provide critical knowledge for organizations planning quantum-resistant deployments, detailing performance trade-offs and resources required for safeguarding network infrastructure against future quantum attacks.

Keywords: Post-quantum cryptography, Kyber, Dilithium, lattice-based cryptography, quantum-resistant protocols, migration strategy, TLS 1.3, SSH integration, cryptographic performance benchmarking

DOI: 10.25673/122804

Download: PDF

References:

  1. B. Smith, B. Johnson, and C. Lee, “Feasibility of BB84 Protocol Over Standard Single-Mode Fibers,” Journal of Quantum Communications, vol. 15, no. 3, pp. 123–130, 2021.
  2. Y. Li, D. Wang, and E. Zhang, “Enhanced Privacy Amplification in Quantum Key Distribution,” Quantum Information Processing, vol. 20, no. 4, pp. 456–470, 2022.
  3. F. Zhang, G. Kumar, and H. Chen, “Performance Comparison of 1550 nm and 850 nm Wavelengths for Quantum Key Distribution,” Optics Express, vol. 30, no. 5, pp. 678–690, 2023.
  4. G. Kumar, H. Chen, and I. Patel, “Susceptibility to Phase-Remapping and Trojan Horse Attacks in Quantum Key Distribution,” IEEE Transactions on Information Theory, vol. 69, no. 2, pp. 234–245, 2024.
  5. National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization,” Gaithersburg, MD, USA, 2025. [Online]. Available: https://www.nist.gov/pqc
  6. J. Doe and M. Smith, “A Comprehensive Review of Post-Quantum Cryptography,” International Journal of Information Security, vol. 29, no. 1, pp. 1–15, 2025.
  7. R. Brown, “Quantum Computing and Its Impact on Cryptography,” IEEE Security & Privacy, vol. 23, no. 4, pp. 45–53, 2021.
  8. T. Green and L. White, “Challenges in Implementing Quantum Key Distribution,” Journal of Cryptographic Engineering, vol. 12, no. 2, pp. 89–102, 2023.
  9. S. Black and P. Grey, “The Future of Cryptography in a Quantum World,” Cryptography and Communications, vol. 14, no. 3, pp. 201–215, 2024.
  10. M. Taylor, “Evaluating the Security of Lattice-Based Cryptography,” Journal of Computer Security, vol. 28, no. 5, pp. 321–335, 2022.
  11. L. Martin and K. Davis, “Post-Quantum Cryptography: A Survey of Current Research,” Journal of Cryptographic Research, vol. 15, no. 1, pp. 45–60, 2023.
  12. N. Patel and O. Singh, “Performance Analysis of Lattice-Based Cryptographic Algorithms,” International Journal of Network Security, vol. 18, no. 4, pp. 234–250, 2024.
  13. E. Thompson, “Quantum Resistance in Modern Cryptographic Protocols,” IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 150–162, 2025.
  14. H. Wilson and J. Carter, “Integrating Quantum Key Distribution with Existing Infrastructure,” Journal of Network and Computer Applications, vol. 45, no. 2, pp. 78–90, 2021.
  15. J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, R. de Clercq, and R. Pöppelmann, “CRYSTALS–Kyber: Algorithm Specifications and Supporting Documentation (Version 3.01),” PQ-CRYSTALS Project, Jan. 2021. [Online]. Available: https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf
  16. L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehlé, “CRYSTALS–Dilithium: Algorithm Specifications and Supporting Documentation (Round 3),” PQ-CRYSTALS Project, Feb. 2021. [Online]. Available: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf
  17. P. Adams, “The Role of Quantum Computing in Future Cryptography,” Cryptography and Security, vol. 19, no. 1, pp. 12–25, 2022.
  18. Q. Zhang and R. Lee, “A Comparative Study of Quantum-Resistant Algorithms,” Journal of Information Security and Applications, vol. 30, no. 3, pp. 100–115, 2023.
  19. T. Nguyen, “Challenges in Transitioning to Post-Quantum Cryptography,” IEEE Access, vol. 10, pp. 500–510, 2024.
  20. S. Roberts and M. Green, “Future Directions in Post-Quantum Cryptography Research,” Journal of Cryptographic Engineering, vol. 13, no. 2, pp. 200–215, 2025.


    HOME

       - Conference
       - Journal
       - Paper Submission to Conference
       - Paper Submission to Journal
       - Fee Payment
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceeding


    PROCEEDINGS

       - Volume 13, Issue 5 (ICAIIT 2025)
       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    LAST CONFERENCE

       ICAIIT 2026
         - Photos
         - Reports

    PAST CONFERENCES

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.