Research Article

Strengthened Key Method in Transition to Quantum Cryptology

Volume: 13 Number: 3 September 30, 2025
EN TR

Strengthened Key Method in Transition to Quantum Cryptology

Abstract

This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially asymmetric encryption methods face serious security risks. In this context, a hybrid encryption method that is more resistant to quantum computer attacks is proposed in the study. The proposed method aims to increase the security of asymmetric algorithms by using pre-shared symmetric key (PSK). In this approach, key distribution is made secure by using symmetric encryption algorithms resistant to quantum attacks such as AES-256. Thus, existing systems gain temporary protection against quantum threats and the transition process is managed more securely. This study examines the integration of symmetric and asymmetric encryption methods, evaluating the performance and potential security risks of the hybrid approach. It is aimed that the proposed method will contribute to the modernization of national and international cryptographic infrastructure and provide a critical Intermediate solution in the transition process to the post-quantum era.

Keywords

References

  1. [1] P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proc. 35th Annu. Symp. Found. Comput. Sci., Santa Fe, NM, USA, 1994, pp. 124–134.
  2. [2] National Institute of Standards and Technology (NIST), "NIST Releases First 3 Finalized Post-Quantum Encryption Standards," Aug. 13, 2024. [Online]. Available: https://www.nist.gov/newsevents/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
  3. [3] D. Moody, R. Perlner, A. Regenscheid, A. Robinson, and D. Cooper, "Transition to Post-Quantum Cryptography Standards," NIST Interagency/Internal Report (NIST IR) 8547, Nov. 12, 2024. [Online]. Available: https://csrc.nist.gov/pubs/ir/8547/ipd
  4. [4] M. Grassl, B. Langenberg, M. Roetteler, and R. Steinwandt, "Applying Grover's algorithm to AES: quantum resource estimates," in Lecture Notes in Computer Science, vol. 9562, pp. 29–43, 2016
  5. [5] X. Bonnetain, M. Naya-Plasencia, and A. Schrottenloher, "Quantum security analysis of AES," in Advances in Cryptology – ASIACRYPT 2020, Cham: Springer, 2020, pp. 451–481. [Online]. Available: https://eprint.iacr.org/2019/1011.
  6. [6] R. Perlner and D. Moody, "Harvesting and the threat of record now, decrypt later," NIST Cybersecurity White Paper, 2021. [Online]. Available: https://csrc.nist.gov/publications/detail/white-paper/2021/record-now-decrypt-later
  7. [7] Y. Chen, N. Alharthi, M. Kamp, and D. Bernstein, "Hybrid Post-Quantum and Classical Cryptographic Schemes," Cryptology ePrint Archive, 2022. [Online]. Available: https://eprint.iacr.org/2022/205
  8. [8] J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002

Details

Primary Language

English

Subjects

Information Security Management

Journal Section

Research Article

Early Pub Date

July 28, 2025

Publication Date

September 30, 2025

Submission Date

April 24, 2025

Acceptance Date

June 23, 2025

Published in Issue

Year 2025 Volume: 13 Number: 3

APA
Selvi, F., & Alkan, M. (2025). Strengthened Key Method in Transition to Quantum Cryptology. Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım Ve Teknoloji, 13(3), 892-905. https://doi.org/10.29109/gujsc.1682989

                                TRINDEX     16167        16166    21432    logo.png

      

    e-ISSN:2147-9526