POST-QUANTUM SECURITY: ANALYZING AND MITIGATING QUANTUM COMPUTING THREATS TO TLS AND QUIC PROTOCOLS
DOI:
https://doi.org/10.34218/IJCET_16_01_220Keywords:
Post-Quantum Cryptography, Transport Layer Security (TLS), QUIC Protocol Security, Quantum-Resistant Algorithms, Cryptographic Migration StrategiesAbstract
This article examines the critical challenges and potential solutions regarding quantum computing's impact on Transport Layer Security (TLS) and QUIC protocols. The article analyzes the vulnerabilities introduced by quantum algorithms, particularly Shor's algorithm and Grover's algorithm, which threaten current cryptographic systems. By investigating the implications for both asymmetric and symmetric cryptography, the research highlights the urgent need for quantum-resistant solutions. It explores various post-quantum cryptographic alternatives, including lattice-based cryptography, hash-based signatures, and code-based systems, while evaluating their implementation challenges and performance characteristics. Through a comprehensive article analysis of standardization efforts, compliance requirements, and migration strategies, the article provides insights into the practical aspects of transitioning to quantum-resistant protocols. The article emphasizes the importance of industry collaboration and international standards development in ensuring successful adoption of post-quantum cryptography. This article contributes to the understanding of quantum computing threats to internet security protocols and provides a roadmap for organizations preparing for the post-quantum era.
References
Man Young Rhee et al., "Network Layer Security," 2013. https://ieeexplore.ieee.org/document/804383
Hilal Ahmad Bhat et al.,, "Quantum Computing: Fundamentals, Implementations and Applications," IEEE Open Journal of Nanotechnology ( Volume: 3), DOI: 10.1109/OJNANO.2022.3178545. May 2022. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9783210
Aashutosh Srivastava. , A. Srivastava, R. Kumar, and M. Singh, "Exploring Shor's Algorithm in Cracking RSA Encryption," in Proc. Vol. 74 No. 1 (2024). https://www.gssrr.org/index.php/JournalOfBasicAndApplied/article/view/17122
Kyung-Bae Jang et al.,, "Grover on Simplified AES: Quantum Resource Estimates and Empirical Analysis," DOI: 10.1109/ICCE-Asia53811.2021.9642017, 2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). https://ieeexplore.ieee.org/document/9642017/authors#authors
M. Raavi, S. Wuthier, P. Chandramouli, Y. Balytskyi, X. Zhou, and S.-Y. Chang, "Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms," 2021. https://cwssp.uccs.edu/sites/g/files/kjihxj2466/files/2021-09/1_Security%20Comparisons%20and%20Performance%20Analyses%20of%20Post-Quantum%20Signature%20Algorithms.pdf
F. Opiłka, M. Niemiec, M. Gagliardi, and M. A. Kourtis, "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature," MDPI, 2024. https://www.mdpi.com/2076-3417/14/12/4994
Tae Seung Kang; et al., "Design and Implementation of Middleware for Cloud Disaster Recovery via Virtual Machine Migration Management," DOI: 10.1109/UCC.2014.25, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. https://ieeexplore.ieee.org/document/7027492
Chen Chuan et al., "A New Live Virtual Machine Migration Strategy: Performance Analysis and Implementation Considerations," DOI: 10.1109/ITiME.2012.6291274, IEEE, 2012 International Symposium on Information Technologies in Medicine and Education. https://ieeexplore.ieee.org/document/6291274
Michelle Hunt, "IAN: The Path to IEEE Standardization for Today's Industry Consortia," June 2022. https://ieee-isto.org/isto-blog/ianthe-path-to-ieee-standardization-for-todays-industry-consortia/
Khondokar Fida Hasan et al., "A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies," IEEE Transactions on Secure Computing, vol. 15, no. 3, pp. 234-245, 2024. https://ieeexplore.ieee.org/document/10417052
Rene Paap, "Preparing for the Post-Quantum Era: A Comprehensive Guide," August 2023. https://www.fortanix.com/blog/preparing-for-the-post-quantum-era-guide
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Gurdeep Kaur Gill (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.