POST-QUANTUM SECURITY: ANALYZING AND MITIGATING QUANTUM COMPUTING THREATS TO TLS AND QUIC PROTOCOLS

Authors

  • Gurdeep Kaur Gill Cisco Systems, USA. Author

DOI:

https://doi.org/10.34218/IJCET_16_01_220

Keywords:

Post-Quantum Cryptography, Transport Layer Security (TLS), QUIC Protocol Security, Quantum-Resistant Algorithms, Cryptographic Migration Strategies

Abstract

This article examines the critical challenges and potential solutions regarding quantum computing's impact on Transport Layer Security (TLS) and QUIC protocols. The article analyzes the vulnerabilities introduced by quantum algorithms, particularly Shor's algorithm and Grover's algorithm, which threaten current cryptographic systems. By investigating the implications for both asymmetric and symmetric cryptography, the research highlights the urgent need for quantum-resistant solutions. It explores various post-quantum cryptographic alternatives, including lattice-based cryptography, hash-based signatures, and code-based systems, while evaluating their implementation challenges and performance characteristics. Through a comprehensive article analysis of standardization efforts, compliance requirements, and migration strategies, the article provides insights into the practical aspects of transitioning to quantum-resistant protocols. The article emphasizes the importance of industry collaboration and international standards development in ensuring successful adoption of post-quantum cryptography. This article contributes to the understanding of quantum computing threats to internet security protocols and provides a roadmap for organizations preparing for the post-quantum era.

References

Man Young Rhee et al., "Network Layer Security," 2013. https://ieeexplore.ieee.org/document/804383

Hilal Ahmad Bhat et al.,, "Quantum Computing: Fundamentals, Implementations and Applications," IEEE Open Journal of Nanotechnology ( Volume: 3), DOI: 10.1109/OJNANO.2022.3178545. May 2022. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9783210

Aashutosh Srivastava. , A. Srivastava, R. Kumar, and M. Singh, "Exploring Shor's Algorithm in Cracking RSA Encryption," in Proc. Vol. 74 No. 1 (2024). https://www.gssrr.org/index.php/JournalOfBasicAndApplied/article/view/17122

Kyung-Bae Jang et al.,, "Grover on Simplified AES: Quantum Resource Estimates and Empirical Analysis," DOI: 10.1109/ICCE-Asia53811.2021.9642017, 2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). https://ieeexplore.ieee.org/document/9642017/authors#authors

M. Raavi, S. Wuthier, P. Chandramouli, Y. Balytskyi, X. Zhou, and S.-Y. Chang, "Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms," 2021. https://cwssp.uccs.edu/sites/g/files/kjihxj2466/files/2021-09/1_Security%20Comparisons%20and%20Performance%20Analyses%20of%20Post-Quantum%20Signature%20Algorithms.pdf

F. Opiłka, M. Niemiec, M. Gagliardi, and M. A. Kourtis, "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature," MDPI, 2024. https://www.mdpi.com/2076-3417/14/12/4994

Tae Seung Kang; et al., "Design and Implementation of Middleware for Cloud Disaster Recovery via Virtual Machine Migration Management," DOI: 10.1109/UCC.2014.25, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. https://ieeexplore.ieee.org/document/7027492

Chen Chuan et al., "A New Live Virtual Machine Migration Strategy: Performance Analysis and Implementation Considerations," DOI: 10.1109/ITiME.2012.6291274, IEEE, 2012 International Symposium on Information Technologies in Medicine and Education. https://ieeexplore.ieee.org/document/6291274

Michelle Hunt, "IAN: The Path to IEEE Standardization for Today's Industry Consortia," June 2022. https://ieee-isto.org/isto-blog/ianthe-path-to-ieee-standardization-for-todays-industry-consortia/

Khondokar Fida Hasan et al., "A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies," IEEE Transactions on Secure Computing, vol. 15, no. 3, pp. 234-245, 2024. https://ieeexplore.ieee.org/document/10417052

Rene Paap, "Preparing for the Post-Quantum Era: A Comprehensive Guide," August 2023. https://www.fortanix.com/blog/preparing-for-the-post-quantum-era-guide

Downloads

Published

2025-02-13

How to Cite

Gurdeep Kaur Gill. (2025). POST-QUANTUM SECURITY: ANALYZING AND MITIGATING QUANTUM COMPUTING THREATS TO TLS AND QUIC PROTOCOLS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 3145-3170. https://doi.org/10.34218/IJCET_16_01_220