EN
TR
Strengthened Key Method in Transition to Quantum Cryptology
Abstract
This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially asymmetric encryption methods face serious security risks. In this context, a hybrid encryption method that is more resistant to quantum computer attacks is proposed in the study.
The proposed method aims to increase the security of asymmetric algorithms by using pre-shared symmetric key (PSK). In this approach, key distribution is made secure by using symmetric encryption algorithms resistant to quantum attacks such as AES-256. Thus, existing systems gain temporary protection against quantum threats and the transition process is managed more securely.
This study examines the integration of symmetric and asymmetric encryption methods, evaluating the performance and potential security risks of the hybrid approach. It is aimed that the proposed method will contribute to the modernization of national and international cryptographic infrastructure and provide a critical Intermediate solution in the transition process to the post-quantum era.
Keywords
References
- [1] P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proc. 35th Annu. Symp. Found. Comput. Sci., Santa Fe, NM, USA, 1994, pp. 124–134.
- [2] National Institute of Standards and Technology (NIST), "NIST Releases First 3 Finalized Post-Quantum Encryption Standards," Aug. 13, 2024. [Online]. Available: https://www.nist.gov/newsevents/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
- [3] D. Moody, R. Perlner, A. Regenscheid, A. Robinson, and D. Cooper, "Transition to Post-Quantum Cryptography Standards," NIST Interagency/Internal Report (NIST IR) 8547, Nov. 12, 2024. [Online]. Available: https://csrc.nist.gov/pubs/ir/8547/ipd
- [4] M. Grassl, B. Langenberg, M. Roetteler, and R. Steinwandt, "Applying Grover's algorithm to AES: quantum resource estimates," in Lecture Notes in Computer Science, vol. 9562, pp. 29–43, 2016
- [5] X. Bonnetain, M. Naya-Plasencia, and A. Schrottenloher, "Quantum security analysis of AES," in Advances in Cryptology – ASIACRYPT 2020, Cham: Springer, 2020, pp. 451–481. [Online]. Available: https://eprint.iacr.org/2019/1011.
- [6] R. Perlner and D. Moody, "Harvesting and the threat of record now, decrypt later," NIST Cybersecurity White Paper, 2021. [Online]. Available: https://csrc.nist.gov/publications/detail/white-paper/2021/record-now-decrypt-later
- [7] Y. Chen, N. Alharthi, M. Kamp, and D. Bernstein, "Hybrid Post-Quantum and Classical Cryptographic Schemes," Cryptology ePrint Archive, 2022. [Online]. Available: https://eprint.iacr.org/2022/205
- [8] J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002
Details
Primary Language
English
Subjects
Information Security Management
Journal Section
Research Article
Early Pub Date
July 28, 2025
Publication Date
September 30, 2025
Submission Date
April 24, 2025
Acceptance Date
June 23, 2025
Published in Issue
Year 2025 Volume: 13 Number: 3
