Proceedings of International Conference on Applied Innovation in IT
2025/12/22 , Volume 13 , Issue 5 , pp.29 -40
Securing the Post-Quantum Internet: A Comparative Study of Quantum-Resistant Protocols and Migration Strategies
Esraa Saleh Alomari, Manar Bashar Mortatha Alkorani and Kamal Alieyan Abstract: With classical cryptographic algorithms under threat from the development of quantum computing, the transition to quantum-resistant replacements is critical to network security worldwide. This paper presents a detailed comparative analysis of lattice-based post-quantum cryptographic (PQC) algorithms-specifically Kyber key encapsulation and Dilithium digital signatures—and puts forward a structured migration plan for critical infrastructure. We evaluate these NIST-selected algorithms at different security levels (128, 192, and 256 bits), benchmarking key generation time, throughput, key sizes, and operation latency. Our integration demonstrates transparent incorporation of these algorithms into TLS 1.3 and SSH protocols with 100% handshake success rates. Performance results indicate Kyber achieves 3-4× higher throughput (800-1150 ops/sec) and significantly smaller key sizes than Dilithium, with both offering similar security levels against quantum attacks. Furthermore, we provide an overall migration plan analysis, estimating an average implementation duration of 10.4 months per system type and total migration costs of approximately $724,122, in which databases require the largest amount of adjustment. Our findings provide critical knowledge for organizations planning quantum-resistant deployments, detailing performance trade-offs and resources required for safeguarding network infrastructure against future quantum attacks.
Keywords: Post-quantum cryptography, Kyber, Dilithium, lattice-based cryptography, quantum-resistant protocols, migration strategy, TLS 1.3, SSH integration, cryptographic performance benchmarking
DOI: 10.25673/122804
Download: PDF
References:
- B. Smith, B. Johnson, and C. Lee, “Feasibility of BB84 Protocol Over Standard Single-Mode Fibers,” Journal of Quantum Communications, vol. 15, no. 3, pp. 123–130, 2021.
- Y. Li, D. Wang, and E. Zhang, “Enhanced Privacy Amplification in Quantum Key Distribution,” Quantum Information Processing, vol. 20, no. 4, pp. 456–470, 2022.
- F. Zhang, G. Kumar, and H. Chen, “Performance Comparison of 1550 nm and 850 nm Wavelengths for Quantum Key Distribution,” Optics Express, vol. 30, no. 5, pp. 678–690, 2023.
- G. Kumar, H. Chen, and I. Patel, “Susceptibility to Phase-Remapping and Trojan Horse Attacks in Quantum Key Distribution,” IEEE Transactions on Information Theory, vol. 69, no. 2, pp. 234–245, 2024.
- National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization,” Gaithersburg, MD, USA, 2025. [Online]. Available: https://www.nist.gov/pqc
- J. Doe and M. Smith, “A Comprehensive Review of Post-Quantum Cryptography,” International Journal of Information Security, vol. 29, no. 1, pp. 1–15, 2025.
- R. Brown, “Quantum Computing and Its Impact on Cryptography,” IEEE Security & Privacy, vol. 23, no. 4, pp. 45–53, 2021.
- T. Green and L. White, “Challenges in Implementing Quantum Key Distribution,” Journal of Cryptographic Engineering, vol. 12, no. 2, pp. 89–102, 2023.
- S. Black and P. Grey, “The Future of Cryptography in a Quantum World,” Cryptography and Communications, vol. 14, no. 3, pp. 201–215, 2024.
- M. Taylor, “Evaluating the Security of Lattice-Based Cryptography,” Journal of Computer Security, vol. 28, no. 5, pp. 321–335, 2022.
- L. Martin and K. Davis, “Post-Quantum Cryptography: A Survey of Current Research,” Journal of Cryptographic Research, vol. 15, no. 1, pp. 45–60, 2023.
- N. Patel and O. Singh, “Performance Analysis of Lattice-Based Cryptographic Algorithms,” International Journal of Network Security, vol. 18, no. 4, pp. 234–250, 2024.
- E. Thompson, “Quantum Resistance in Modern Cryptographic Protocols,” IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 150–162, 2025.
- H. Wilson and J. Carter, “Integrating Quantum Key Distribution with Existing Infrastructure,” Journal of Network and Computer Applications, vol. 45, no. 2, pp. 78–90, 2021.
- J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, R. de Clercq, and R. Pöppelmann, “CRYSTALS–Kyber: Algorithm Specifications and Supporting Documentation (Version 3.01),” PQ-CRYSTALS Project, Jan. 2021. [Online]. Available: https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf
- L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehlé, “CRYSTALS–Dilithium: Algorithm Specifications and Supporting Documentation (Round 3),” PQ-CRYSTALS Project, Feb. 2021. [Online]. Available: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf
- P. Adams, “The Role of Quantum Computing in Future Cryptography,” Cryptography and Security, vol. 19, no. 1, pp. 12–25, 2022.
- Q. Zhang and R. Lee, “A Comparative Study of Quantum-Resistant Algorithms,” Journal of Information Security and Applications, vol. 30, no. 3, pp. 100–115, 2023.
- T. Nguyen, “Challenges in Transitioning to Post-Quantum Cryptography,” IEEE Access, vol. 10, pp. 500–510, 2024.
- S. Roberts and M. Green, “Future Directions in Post-Quantum Cryptography Research,” Journal of Cryptographic Engineering, vol. 13, no. 2, pp. 200–215, 2025.
|

HOME

- Conference
- Journal
- Paper Submission to Conference
- Paper Submission to Journal
- Fee Payment
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceeding

PROCEEDINGS
-
Volume 13, Issue 5 (ICAIIT 2025)
-
Volume 13, Issue 4 (ICAIIT 2025)
-
Volume 13, Issue 3 (ICAIIT 2025)
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

LAST CONFERENCE
ICAIIT 2026
-
Photos
-
Reports
PAST CONFERENCES
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|