SlideShare a Scribd company logo
International Conference on Recent Developments in Cyber Security (ReDCySec2023)
30-31 May, 2024
Organized by Center for Cyber Security and Cryptology, Sharda University
Presenter:
Paper ID:
Navigating Post-Quantum Blockchain: Resilient
Cryptography in Quantum Threats
by
Dr Anupam Tiwari, Ph.D
#7
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
— Problem Statement
— Introduction
— Cryptographic Primitives in Blockchain Technology
— Vulnerabilities of current cryptography to QC attacks in Blockchain Technology
— Foundations of PQC
— Literature Review
— Current State
— Challenges
— Conclusion
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
PRESENTATION LAYOUT
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Navigating Post-Quantum Blockchain: Resilient
Cryptography in Quantum Threats
PROBLEM STATEMENT
INTRODUCTION
— Blockchain banks heavily on CRYPTOGRAPHY
— Blockchain imparts all it’s well known characteristics attributed to CRYPTOGRAPHY
• Transparency
• Redundancy
• Accountability
• Immutability
• Decentralization
• Consensus - Proof-of-work
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Traditional CRYPTOGRAPHIC algorithms, which have effectively
demonstrated data integrity and privacy, now are confronted with
QUANTUM COMPUTERS
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
INTRODUCTION
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
WELL KNOWN ENCRYPTION & HASHING ALGORITHMS
RSA: Based on prime factorization
difficulty.
AES: Utilizes substitution-permutation
network.
DES: Employs Feistel network
structure.
ECC: Relies on elliptic curve
properties.
Diffie-Hellman: Solves discrete
logarithm problem.
SHA: Uses Merkle-Damgård construction
Blowfish: Variable key length Feistel
network.
Twofish: Variable key size substitution-
permutation network.
DSA: Modular exponentiation for
signatures.
RC4: Stream cipher for data encryption.
Well known Encryption and Hashing Algorithms
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Where is Cryptography used in Blockchain Technology?
—Hash Functions
• Data Integrity
• Digital Signatures and Authenticity
—Public-Key Infrastructure (PKI) and Key Exchange
• Cryptographic Random Number Generators
• Merkle trees
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
VULNERABILITIES OF CURRENT CRYPTOGRAPHY TO QC ATTACKS
IN
BLOCKCHAIN TECHNOLOGY
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Vulnerabilities of Current Cryptography to QC Attacks in BCT
—Shor's Algorithm
• Quantum algorithm for factoring large integers.
• Threatens security of RSA and other cryptographic schemes.
• Exponential speedup over classical factoring algorithms.
• Basis for potential quantum attacks on modern encryption.
• Discovered by Peter Shor in 1994.
—Grover's Algorithm
• Quantum search algorithm for unsorted databases.
• Quadratic speedup compared to classical search.
• Implications for breaking symmetric key cryptography.
• Discovered by Lov Grover in 1996.
Shor's algorithm threatens
Asymmetric Encryption by
efficiently factoring large
numbers, compromising
security.
Grover's algorithm poses a
threat to Symmetric Encryption
by speeding up brute-force
attacks, reducing its
effectiveness.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Asymmetric Encryption Algorithms
Symmetric Encryption Algorithms
CONTEXT PQC
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Asymmetric Encryption Algorithms
• Generally more vulnerable to quantum threats compared to
symmetric encryption algorithms.
• Arises from the fact that many asymmetric encryption algorithms rely
on mathematical problems that can be efficiently solved by quantum
computers
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Symmetric Encryption Algorithms
• Considered to be less vulnerable to quantum threats because they do
not rely on the same mathematical problems as asymmetric encryption.
• Typically based on operations such as Permutations, Substitutions,
and Bitwise operations rather than the mathematical problems that
asymmetric encryption algorithms rely on.
Thus
• Emergence of Quantum Computing raises concerns about the future
security of blockchain networks relying on traditional cryptographic methods.
• Transitioning to post-quantum cryptographic methods is imperative to
ensure the continued security of digital communication and asset protection
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Foundations of Post
Quantum Cryptography
(PQC)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Foundations of Post
Quantum Cryptography
(PQC) • Quantum cryptography relies on the
principles of quantum mechanics to
secure communication channels.
• Unlike classical cryptography, quantum
cryptography utilizes the behavior of
particles like photons to create secure
communication protocols.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
• Qubits
• Superposition
• Entanglement
• Quantum Gates
• Quantum Algorithms
• De-coherence & Error Correction
• Quantum Measurement
Foundations of Post
Quantum Cryptography
(PQC)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
• Qubits: Quantum computing's core, like classical bits
• Superposition: Qubits can represent 0 and 1 simultaneously, boosting computational power.
• Entanglement: Qubits can be correlated regardless of distance, enhancing computational capabilities.
• Quantum Gates: Manipulate qubits to perform operations like classical logic gates.
• Quantum Algorithms: Leverage qubits to solve problems exponentially faster than classical methods.
• De-coherence & Error Correction: Techniques counteract errors caused by environmental factors.
• Quantum Measurement: Process collapses qubit states, providing classical output from quantum
computations.
Foundations of PQC
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
• In the world of computers, information is built on bits, tiny switches that are either on (1) or off (0).
• Quantum computers take things a step further with qubits. These are like bits, but weirder.
• A qubit can be 1, 0, or both at the same time (superposition), thanks to the strangeness of quantum
mechanics. Imagine a coin spinning – it's both heads and tails until you stop it and look.
• This lets qubits explore many possibilities simultaneously, making them supercharged for tackling
problems that would take regular computers forever.
• Here's the catch: qubits are delicate. Measuring them forces them to be a 1 or 0, collapsing their
superposition. But if we can harness them, they hold immense potential for revolutionizing fields like
medicine, materials science, and cryptography. Think of it as unlocking a whole new way of processing
information, with qubits as the key.
QUBITS
• Qubits vs Bits: Qubits, the building blocks of quantum computers, differ from classical bits. While bits
are restricted to 0 or 1, qubits can be in a superposition of both states at once.
• Superposition Explained: This "both-at-once" state arises from quantum mechanics. Mathematically, a
qubit's state is a combination of |0> and |1> with probabilities encoded by complex numbers (amplitudes).
• Basis States: The |0> and |1> states are the foundation for qubits. They act as reference points for
describing more complex quantum states.
• Bloch Sphere Visualization: This mathematical tool depicts a qubit's state as a point on a sphere. The
position depends on the amplitudes associated with the basis states.
• Parallel Processing Power: Superposition allows multiple qubits to explore numerous possibilities
simultaneously. This unlocks the ability to tackle problems that would overwhelm classical computers.
• Fragile Nature: Measuring a qubit forces it to collapse into a definite state (0 or 1), destroying the
superposition. Careful control is needed to harness its potential.
SUPERPOSITION
• Twin Qubits: Imagine two qubits linked like twins. This is entanglement, where their fates are
connected.
• Instantaneous Connection: A change in one entangled qubit instantly affects the other, no matter the
distance. (Think: Separated coins flipping the same way every time!)
• Not Teleportation: Entanglement doesn't transmit information faster than light, but allows for powerful
correlations in quantum algorithms.
• Beyond Bits: Unlike classical bits, entangled qubits share a single quantum state, defying classical
physics.
• Unlocking Potential: Entanglement holds promise for secure communication and solving complex
problems in various fields.
ENTANGLEMENT: SPOOKY ACTION AT A DISTANCE
• The Tools of the Trade: Quantum gates are like logic gates in classical computers, but for qubits. They
manipulate the superposition and entanglement of qubits.
• Flipping and Combining: Common gates like Hadamard and CNOT can flip a qubit's state (0 to 1 or
vice versa) or combine the states of two entangled qubits.
• Building Quantum Circuits: By combining different gates in specific sequences, we create quantum
circuits to perform complex calculations.
• Unlocking Potential: Quantum gates allow us to control and orchestrate the unique properties of
qubits, paving the way for solving problems intractable for classical computers.
• Precision is Key: Quantum gates are delicate, requiring precise control to maintain the fragile quantum
states of qubits.
QUANTUM GATES: THE ARCHITECTS OF QUBIT MAGIC
• Beyond Classical Limits: Unlike classical algorithms designed for bits, quantum algorithms leverage
the power of superposition and entanglement.
• Tackling the Intractable: These algorithms can solve certain problems exponentially faster than
classical computers, especially those involving complex optimization or large simulations.
• Famous Examples: Shor's Algorithm could break many encryption standards, while Grover's Algorithm
can speed up search tasks.
• Still Under Development: Quantum algorithms are a young field, constantly evolving and being
optimized for specific tasks.
• The Future is Quantum: Mastering these algorithms will unlock breakthroughs in fields like drug
discovery, materials science, and financial modeling.
QUANTUM ALGORITHMS
• Decoherence is the enemy of qubits. It's the loss of their delicate quantum states due to interactions
with the environment, making them behave classically (0 or 1).
• Keeping it Quantum: Quantum error correction fights back. These techniques use multiple qubits to
encode information redundantly, detecting and correcting errors caused by decoherence.
• Like Fort Knox for Qubits: Error correction codes act like shields, protecting the fragile superposition
of qubits during computations.
• The Challenge Remains: Implementing effective error correction requires many extra qubits, making it
a hurdle for large-scale quantum computers.
• The Race is On: Researchers are constantly developing new error correction methods to pave the way
for robust and reliable quantum computations.
DE-COHERENCE & ERROR CORRECTION
• Extracting the Unknown: Unlike classical bits, qubits hold probabilistic information. Measurement
aims to extract this information from a qubit (or entangled qubits) existing in superposition (both 0 and 1).
• Superposition Collapse: Measurement forces the "both-at-once" state to collapse. The qubit is forced
into a definite state (0 or 1) – a one-way trip.
• Probabilistic Outcomes: Forget certainties! We only get the probability of finding the qubit in a specific
state (0 or 1) after measurement, based on its wavefunction before.
• The Observer Effect: Measurement requires interaction with a device, disrupting the qubit and forcing
collapse. This interaction highlights how the act of measurement itself influences the system.
• Bridging Two Worlds: Quantum measurement connects the probabilistic world of qubits with the
classical world of definite states. It provides information, but fundamentally alters the measured system.
QUANTUM MEASUREMENT
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
LITERATURE REVIEW
Hash Function(s) Used Blockchain Platforms
SHA-256
Bitcoin, Ripple (XRP), Bitcoin Cash, TRON, VeChain,
Stellar, Algorand, NEM, Hedera Hashgraph
Keccak-256 (SHA-3)
Ethereum, Binance Smart Chain, Cardano, Polkadot,
Solana, EOS
Blake2b Binance Smart Chain, Cardano
Scrypt Litecoin, Multichain
CryptoNight Monero
Kerl (Custom Hash Function) IOTA
X11 (Combination of Hash Functions) Dash
Equihash (Memory-Bound Proof-of-Work) Zcash
RIPEMD-160 Bitcoin, Tezos, NEO
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[8]: System design has been proposed that schemes a voting system on the
blockchain, incorporating PQC offering a systematic and critical view towards laying
down a quantum-resistant blockchain for near future online voting systems in the
PQC era ahead.
[9] addresses the challenge of collaborating network services with heterogeneous
devices from various vendors by leveraging blockchain technology.
Research also explores the integration of PQC algorithms to safeguard against
future threats and demonstrates superior write performance of Quorum Blockchain
by exploiting PQC algorithm shortest vector problem (SVP) in a lattice.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[12]: Employs Grobner basis algorithms over finite fields, bidding better security
against possible quantum attacks
Grobner basis algorithms
Special kind of set of polynomials that captures the
essence of a larger set. Like having a bunch of complex
polynomial equations & a Grobner basis renders a
simplified set that holds all the essential
information about the original equations, making it
easier to analyze.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[12]: Employs Grobner basis algorithms over finite fields, bidding better security
against possible quantum attacks
[13]: Concentrating specifically on Bitcoin & Ethereum, the authors demonstrate how
these platforms enable primitives to ensure data integrity, authenticity, and non-
repudiation and then they acknowledge the potential threat posed by emergent QC
advancements. The authors foresee a future where BCT networks employ NIST-
recommended PQC primitives, ascertaining their continued practicality in the QC era.
Primitive Name Vulnerability Quantum Attack Impact on Blockchain Security
Elliptic Curve
Cryptography
Shor's Algorithm
Breaks ECC algorithms used for digital
signatures and key exchange
Loss of transaction integrity, unauthorized access to
funds, and potential manipulation of the ledger
RSA Shor's Algorithm
Breaks RSA algorithms used for digital
signatures and key exchange
Similar impact as ECC
SHA-256 Grover's Algorithm
Enables finding collisions with
considerably less effort
Potential for forging transactions and compromising
data integrity
ECDSA Signatures Shor's Algorithm Breaks ECDSA signature scheme Loss of transaction authenticity and non-repudiation
Merkle Trees Grover's Algorithm
Speeds up finding preimages and
second preimages
Potential for forging transactions and compromising
data integrity
Proof-of-Work Grover's Algorithm
Enables finding solutions to PoW
puzzles with reduced computational
effort
Potential for mining dominance and centralization of
the network
Most PQC algorithms base
their security on one or
more of the mathematical
problems
PQC methods with
different mathematical
foundations
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
Isogeny Based
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve
Most PQC algorithms base
their security on one or
more of the mathematical
problems
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
Isogeny Based
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve
PQC methods that are to be
taken seriously belong to 5
families that differ in
mathematical foundations
• Building with Lattices: This approach leverages mathematical structures called lattices – grids of
points formed by integer combinations of vectors.
• Hard Problems, Secure Keys: The security of lattice-based PQC relies on the difficulty of solving
specific lattice problems in polynomial time, even for quantum computers. Think complex mazes with no
easy escape!
• Encryption & Signatures: Lattice-based schemes offer both encryption and digital signature
functionalities, crucial for secure communication and data integrity in the quantum age.
• Standardization on the Horizon: Promising lattice-based PQC algorithms like CRYSTALS-KYBER and
CRYSTALS-Dilithium are undergoing standardization, paving the way for real-world adoption.
LATTICE IS SPECIAL TODAY
Approaches of Post Quantum Cryptography
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Based on Description TRL
Lattice Based Mathematical structures based on grids of points and Defined by basis
vectors
4
Code Based Relies on error-correcting codes for its security 3
Multivariate Polynomial Employs systems of polynomial equations for cryptographic security. 2
Hash Based Leverages the collision resistance 4
Isogeny Based Involves the complexity of computing isogenies between elliptic curves. 5
Primitive Name Potential Post-Quantum Replacement Algorithm
Elliptic Curve Cryptography
Lattice-based cryptography, multivariate cryptography, Supersingular
Isogeny Diffie-Hellman (SIDH)
RSA
Lattice-based cryptography, multivariate cryptography, post-quantum RSA
(PQ-RSA)
SHA-256 Quantum-resistant Merkle trees
ECDSA Signatures Lattice-based signatures, multivariate signatures, XMSS
Merkle Trees
Quantum-resistant Merkle trees with alternative collision-resistant hash
functions
Proof-of-Work
Quantum-resistant PoW algorithms, post-quantum consensus
mechanisms
Potential Post-Quantum Replacement Algorithm
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Mechanism Name Latency Throughput
Energy
Consumption
Scalability
Suitability for Different Blockchain Use
Cases
Lattice-based Moderate Moderate High Good
Suitable for public and permissioned
blockchains
Multivariate BFT Low Moderate Low Good
Suitable for resource-constrained private
blockchains
Isogeny Moderate High Moderate Good
Suitable for high-throughput applications
and public blockchains
Hash-based Low Moderate Low Good
Suitable for private blockchains requiring
fast consensus
Quantum-resistant
Proof of Work (PoW)
High Low High Moderate
Suitable for public blockchains requiring
high security and decentralization
Quantum-resistant
Proof of Stake (PoS)
Moderate Moderate Low Good
Suitable for public and permissioned
blockchains
PQC MECHANISMS: PERFORMANCE & SUITABILITY FOR BLOCKCHAIN
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CURRENT STATE
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
NIST chose four finalist algorithms in July 2022 for post-quantum cryptography.
The fourth standard (FALCON) will release its draft for comments in 2024.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CRYSTALS-Kyber : Lattice method for asymmetric encryption.
CRYSTALS-Dilithium : Lattice method, it is used for digital signature.
FALCON : Signature method is also based on lattices.
SPHINCS+ : Hash-based SPHINCS+ is another signature method
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.
NIST chose four finalist algorithms in July 2022 for post-quantum cryptography.
The fourth standard (FALCON) will release its draft for comments in 2024.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CRYSTALS-Kyber : Lattice method for asymmetric encryption.
CRYSTALS-Dilithium : Lattice method, it is used for digital signature.
FALCON : Signature method is also based on lattices.
SPHINCS+ : Hash-based SPHINCS+ is another signature method
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.
In addition to NIST, German federal office BSI recommends two PQC models
• Classic McEliece
• FrodoKEM
IETF has proposed two hash based models
• XMSS (RFC 8391)
• Leighton-Micali (RFC 8554)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Literature Review Summary
- 15 Papers explored with Lattice based PQC in maximum
- Voting enabled on blockchain applications
- Max demonstrations limited to Ethereum blockchain and few on Quoram
- QKD for Quantum-Safe Smart Contracts
- Mostly Theoretical frameworks
- Lack of Quantum research resources
- Promising and Definite association of Blockchain and PQC
- Threats and repercussions to Smart Contracts
- Existing Governance Mechanisms in place
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CHALLENGES OF IMPLEMENTING PQC IN BLOCKCHAIN
Challenges of Implementing PQC in Blockchain
— Performance and Efficiency
• PQC algorithms demand more computation, potentially slowing down blockchain platforms.
— Interoperability and Compatibility
• Integrating PQC requires major updates to blockchain protocols for compatibility with existing systems.
• Lack of standardized PQC algorithms can lead to compatibility issues across blockchain platforms.
— Security Considerations in Transitioning to PQC
• PQC implementations are vulnerable to side-channel attacks.
— Migration
• Likewise for any migration in PQC by NIST, there exists a number of challenges
—Current Chip Architectures
• Current card chip architectures are designed for RSA or Diffie-Hellman keys and have a corresponding coprocessor.
• In contrast, they are not designed to perform lattice or, code operations, certainly not with the necessary key lengths.
• Revision of current chip architectures is therefore an important challenge for the coming years
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Conclusion
• Solution without a problem
• Cryptoagility
• Ability of a cryptographic system to rapidly adapt and evolve in response to new
threats, vulnerabilities, or technological advancements
• Realisation of threat by state
• Harvest now Decrypt Later
• Blockchain future readiness imminent
• AI arrival spoils the scenario further
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
1. H. A. Bhat, F. A. Khanday, B. K. Kaushik, F. Bashir and K. A. Shah, "Quantum Computing: Fundamentals, Implementations and Applications," in IEEE Open Journal
of Nanotechnology, vol. 3, pp. 61-77, 2022, doi: 10.1109/OJNANO.2022.3178545.
2. Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International
Congress on Big Data (BigData Congress), Honolulu, HI, USA, 2017, pp. 557-564, doi: 10.1109/BigDataCongress.2017.85.
3. A. Khalid, S. McCarthy, M. O’Neill and W. Liu, "Lattice-based Cryptography for IoT in A Quantum World:Are We Ready?," 2019 IEEE 8th International Workshop on
Advances in Sensors and Interfaces (IWASI), Otranto, Italy, 2019, pp. 194-199, doi: 10.1109/IWASI.2019.8791343.
4. A. Kuznetsov, A. Kiian, M. Lutsenko, I. Chepurko and S. Kavun, "Code-based cryptosys-tems from NIST PQC," 2018 IEEE 9th International Conference on
Dependable Systems, Services and Technologies (DESSERT), Kyiv, UKraine, 2018, pp. 282-287, doi: 10.1109/DESSERT.2018.8409145.
5. A. C. H. Chen, "Post-Quantum Cryptography Neural Network," 2023 International Confe-rence on Smart Systems for applications in Electrical Sciences
(ICSSES),Tumakuru, India, 2023, pp. 1-6, doi: 10.1109/ICSSES58299.2023.10201083.
6. A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshaya and N. Nagy, "Experi-mental Implementation of Shor's Quantum Algorithm to Break RSA," 2022 14th
International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 748-752,
doi:10.1109/CICN56167.2022.10008287.
7. A. Mandviwalla, K. Ohshiro and B. Ji, "Implementing Grover’s Algorithm on the IBM
Quantum Computers," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 2531-2537, doi: 10.1109/BigData.2018.8622457.
8. S. Gupta, K. K. Gupta, P. K. Shukla and M. K. Shrivas, "Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)," 2022 Second
International Conference on Power, Control and Computing Technologies (ICPC2T), Rai-pur, India, 2022, pp. 1-8, doi: 10.1109/ICPC2T53885.2022.9776966.
9. E. Zeydan, J. Baranda and J. Mangues-Bafalluy, "Post-Quantum Blockchain-Based Secure Service Orchestration in Multi-Cloud Networks," in IEEE Access, vol. 10,
pp. 129520-129530, 2022, doi: 10.1109/ACCESS.2022.3228823.
10. Allende, M. et al. (2023) ‘Quantum-resistance in Blockchain Networks’, Scientific Reports, 13(1). doi:10.1038/s41598-023-32701-6.
11. T. M. Fernández-Caramès and P. Fraga-Lamas, "Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing
Attacks," in IEEE Access, vol. 8, pp. 21091-21116, 2020, doi: 10.1109/ACCESS.2020.2968985.
12. J. Chen, W. Gan, M. Hu and C. -M. Chen, "On the Construction of a Post-Quantum Block-chain," 2021 IEEE Conference on Dependable and Secure Computing
(DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346253.
References
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
13. A. H. Lone and R. Naaz, "Demystifying Cryptography behind Blockchains and a Vision for Post-Quantum Blockchains," 2020 IEEE International Conference for
Innovation in Technology (INOCON), Bangluru, India, 2020, pp. 1-6, doi:
10.1109/INOCON50539.2020.9298215.
14. K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto and T. Schroeter, "Blockchained Post-Quantum Signatures," 2018 IEEE International Conference on Internet
of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), Halifax, NS, Canada, 2018, pp. 1196-1203, doi: 10.1109/Cybermatics_2018.2018.00213.
15. Xu, S., Sun, A., Ren, Z. et al. Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. J Comb Optim 45,
116 (2023). https://doi.org/10.1007/s10878-023-01047-0
16. Gharavi, H. (2023) ‘Post Quantum Blockchain Security for the internet of things survey and research directions’, JOURNAL OF IEEE COMMUNICATIONS
SURVEYS & TUTORIALS [Preprint]. doi:10.36227/techrxiv.22821692.v1.
17. Buser, M. et al. (2023) ‘A survey on exotic signatures for Post-quantum Blockchain: Challenges and research directions’, ACM Computing Surveys, 55(12), pp. 1–32.
doi:10.1145/3572771.
18. R. Saha et al., "A Blockchain Framework in Post-Quantum Decentralization," in IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 1-12, 1 Jan.-Feb.
2023, doi: 10.1109/TSC.2021.3116896.
19. Seok, B.; Park, J.; Park, J.H. A Lightweight Hash-Based BlockchainArchitecture for Indus-trial IoT. Appl. Sci. 2019, 9, 3740. https://doi.org/10.3390/app9183740
20. Zijlstra, T. (2020) Secure hardware accelerators for Post Quantum Cryptography, theses. Available at: https://theses.hal.science/tel-02953277v1 (Accessed: 09 Dec
2023).
21. X. Yang, B. Li, Y. Zhang, J. Wu and P. Yuan, "A Hybrid Blockchain-BasedAuthentication Scheme for Smart Home," 2020 IEEE 5th International Conference on
Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 893-897, doi: 10.1109/ICSIP49896.2020.9339278.
22. Teague, T. (2022) University of Arkansas, Fayetteville scholarworks@uark, https://scholarworks.uark.edu/.Available at:
https://scholarworks.uark.edu/cgi/viewcontent.cgi?article=1106&context=csceuht (Ac-cessed: 09 December 2023).
23. Swayne, M. (2024) Blockchain, Quantum Experts Develop Framework to Keep Blockchain Safe from Quantum Computers.
https://thequantuminsider.com/2023/05/02/blockchain-quantum-experts-develop-framework-to-keep-blockchain-safe-from-quantum-computers/.
24. Chik, H. and Chik, H. (2022) 'Chinese blockchain platform ChainMaker says it has new technology to keep it secure from quantum attacks,' South China Morning
Post, 9 June. https://www.scmp.com/news/china/science/article/3180884/chinese-blockchain-platform-chainmaker-says-it-has-new.
25. Dargan, J. (2024) BTQ & ITRI announce collaboration to develop next-generation semiconductor technology for post-quantum cryptography.
https://thequantuminsider.com/2022/09/07/btq-itri-announce-collaboration-to-develop-next-generation-semiconductor-technology-for-post-quantum-cryptography/.
References
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024

More Related Content

Similar to Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
CryptoQuantumLeap.pdf
CryptoQuantumLeap.pdfCryptoQuantumLeap.pdf
CryptoQuantumLeap.pdf
mocharizal191
 
Quantum Computing: Unleashing the Power of Quantum Mechanics
Quantum Computing: Unleashing the Power of Quantum MechanicsQuantum Computing: Unleashing the Power of Quantum Mechanics
Quantum Computing: Unleashing the Power of Quantum Mechanics
TechCyber Vision
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
Hedera Hashgraph
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
domenico di mola
 
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
msajmani2704
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
achakracu
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
Software Guru
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
Christian Waha
 
Navneet presentation
Navneet presentationNavneet presentation
Navneet presentation
Navneet kumar
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
Object Automation
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
toget48099
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
Object Automation
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Rajasekhar Manda
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdf
zoobiarana76
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 

Similar to Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
CryptoQuantumLeap.pdf
CryptoQuantumLeap.pdfCryptoQuantumLeap.pdf
CryptoQuantumLeap.pdf
 
Quantum Computing: Unleashing the Power of Quantum Mechanics
Quantum Computing: Unleashing the Power of Quantum MechanicsQuantum Computing: Unleashing the Power of Quantum Mechanics
Quantum Computing: Unleashing the Power of Quantum Mechanics
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
 
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
 
Navneet presentation
Navneet presentationNavneet presentation
Navneet presentation
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdf
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 

More from anupriti

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 
Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
anupriti
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
anupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
anupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
anupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
anupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
anupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
anupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
anupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
anupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
anupriti
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
anupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
anupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
anupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
anupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
anupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
anupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
anupriti
 

More from anupriti (20)

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 
Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 

Recently uploaded

Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 

Recently uploaded (20)

Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 

Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats

  • 1. International Conference on Recent Developments in Cyber Security (ReDCySec2023) 30-31 May, 2024 Organized by Center for Cyber Security and Cryptology, Sharda University Presenter: Paper ID: Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats by Dr Anupam Tiwari, Ph.D #7 InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 2. — Problem Statement — Introduction — Cryptographic Primitives in Blockchain Technology — Vulnerabilities of current cryptography to QC attacks in Blockchain Technology — Foundations of PQC — Literature Review — Current State — Challenges — Conclusion InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 PRESENTATION LAYOUT
  • 3. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats PROBLEM STATEMENT
  • 4. INTRODUCTION — Blockchain banks heavily on CRYPTOGRAPHY — Blockchain imparts all it’s well known characteristics attributed to CRYPTOGRAPHY • Transparency • Redundancy • Accountability • Immutability • Decentralization • Consensus - Proof-of-work InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 5. Traditional CRYPTOGRAPHIC algorithms, which have effectively demonstrated data integrity and privacy, now are confronted with QUANTUM COMPUTERS InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 INTRODUCTION
  • 6. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 WELL KNOWN ENCRYPTION & HASHING ALGORITHMS
  • 7. RSA: Based on prime factorization difficulty. AES: Utilizes substitution-permutation network. DES: Employs Feistel network structure. ECC: Relies on elliptic curve properties. Diffie-Hellman: Solves discrete logarithm problem. SHA: Uses Merkle-Damgård construction Blowfish: Variable key length Feistel network. Twofish: Variable key size substitution- permutation network. DSA: Modular exponentiation for signatures. RC4: Stream cipher for data encryption. Well known Encryption and Hashing Algorithms InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 8. Where is Cryptography used in Blockchain Technology? —Hash Functions • Data Integrity • Digital Signatures and Authenticity —Public-Key Infrastructure (PKI) and Key Exchange • Cryptographic Random Number Generators • Merkle trees InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 9. VULNERABILITIES OF CURRENT CRYPTOGRAPHY TO QC ATTACKS IN BLOCKCHAIN TECHNOLOGY InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 10. Vulnerabilities of Current Cryptography to QC Attacks in BCT —Shor's Algorithm • Quantum algorithm for factoring large integers. • Threatens security of RSA and other cryptographic schemes. • Exponential speedup over classical factoring algorithms. • Basis for potential quantum attacks on modern encryption. • Discovered by Peter Shor in 1994. —Grover's Algorithm • Quantum search algorithm for unsorted databases. • Quadratic speedup compared to classical search. • Implications for breaking symmetric key cryptography. • Discovered by Lov Grover in 1996. Shor's algorithm threatens Asymmetric Encryption by efficiently factoring large numbers, compromising security. Grover's algorithm poses a threat to Symmetric Encryption by speeding up brute-force attacks, reducing its effectiveness. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 11. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Asymmetric Encryption Algorithms Symmetric Encryption Algorithms CONTEXT PQC
  • 12. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Asymmetric Encryption Algorithms • Generally more vulnerable to quantum threats compared to symmetric encryption algorithms. • Arises from the fact that many asymmetric encryption algorithms rely on mathematical problems that can be efficiently solved by quantum computers
  • 13. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Symmetric Encryption Algorithms • Considered to be less vulnerable to quantum threats because they do not rely on the same mathematical problems as asymmetric encryption. • Typically based on operations such as Permutations, Substitutions, and Bitwise operations rather than the mathematical problems that asymmetric encryption algorithms rely on.
  • 14. Thus • Emergence of Quantum Computing raises concerns about the future security of blockchain networks relying on traditional cryptographic methods. • Transitioning to post-quantum cryptographic methods is imperative to ensure the continued security of digital communication and asset protection InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 15. Foundations of Post Quantum Cryptography (PQC) InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 16. Foundations of Post Quantum Cryptography (PQC) • Quantum cryptography relies on the principles of quantum mechanics to secure communication channels. • Unlike classical cryptography, quantum cryptography utilizes the behavior of particles like photons to create secure communication protocols. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 17. • Qubits • Superposition • Entanglement • Quantum Gates • Quantum Algorithms • De-coherence & Error Correction • Quantum Measurement Foundations of Post Quantum Cryptography (PQC) InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 18. • Qubits: Quantum computing's core, like classical bits • Superposition: Qubits can represent 0 and 1 simultaneously, boosting computational power. • Entanglement: Qubits can be correlated regardless of distance, enhancing computational capabilities. • Quantum Gates: Manipulate qubits to perform operations like classical logic gates. • Quantum Algorithms: Leverage qubits to solve problems exponentially faster than classical methods. • De-coherence & Error Correction: Techniques counteract errors caused by environmental factors. • Quantum Measurement: Process collapses qubit states, providing classical output from quantum computations. Foundations of PQC InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 19. • In the world of computers, information is built on bits, tiny switches that are either on (1) or off (0). • Quantum computers take things a step further with qubits. These are like bits, but weirder. • A qubit can be 1, 0, or both at the same time (superposition), thanks to the strangeness of quantum mechanics. Imagine a coin spinning – it's both heads and tails until you stop it and look. • This lets qubits explore many possibilities simultaneously, making them supercharged for tackling problems that would take regular computers forever. • Here's the catch: qubits are delicate. Measuring them forces them to be a 1 or 0, collapsing their superposition. But if we can harness them, they hold immense potential for revolutionizing fields like medicine, materials science, and cryptography. Think of it as unlocking a whole new way of processing information, with qubits as the key. QUBITS
  • 20. • Qubits vs Bits: Qubits, the building blocks of quantum computers, differ from classical bits. While bits are restricted to 0 or 1, qubits can be in a superposition of both states at once. • Superposition Explained: This "both-at-once" state arises from quantum mechanics. Mathematically, a qubit's state is a combination of |0> and |1> with probabilities encoded by complex numbers (amplitudes). • Basis States: The |0> and |1> states are the foundation for qubits. They act as reference points for describing more complex quantum states. • Bloch Sphere Visualization: This mathematical tool depicts a qubit's state as a point on a sphere. The position depends on the amplitudes associated with the basis states. • Parallel Processing Power: Superposition allows multiple qubits to explore numerous possibilities simultaneously. This unlocks the ability to tackle problems that would overwhelm classical computers. • Fragile Nature: Measuring a qubit forces it to collapse into a definite state (0 or 1), destroying the superposition. Careful control is needed to harness its potential. SUPERPOSITION
  • 21. • Twin Qubits: Imagine two qubits linked like twins. This is entanglement, where their fates are connected. • Instantaneous Connection: A change in one entangled qubit instantly affects the other, no matter the distance. (Think: Separated coins flipping the same way every time!) • Not Teleportation: Entanglement doesn't transmit information faster than light, but allows for powerful correlations in quantum algorithms. • Beyond Bits: Unlike classical bits, entangled qubits share a single quantum state, defying classical physics. • Unlocking Potential: Entanglement holds promise for secure communication and solving complex problems in various fields. ENTANGLEMENT: SPOOKY ACTION AT A DISTANCE
  • 22. • The Tools of the Trade: Quantum gates are like logic gates in classical computers, but for qubits. They manipulate the superposition and entanglement of qubits. • Flipping and Combining: Common gates like Hadamard and CNOT can flip a qubit's state (0 to 1 or vice versa) or combine the states of two entangled qubits. • Building Quantum Circuits: By combining different gates in specific sequences, we create quantum circuits to perform complex calculations. • Unlocking Potential: Quantum gates allow us to control and orchestrate the unique properties of qubits, paving the way for solving problems intractable for classical computers. • Precision is Key: Quantum gates are delicate, requiring precise control to maintain the fragile quantum states of qubits. QUANTUM GATES: THE ARCHITECTS OF QUBIT MAGIC
  • 23. • Beyond Classical Limits: Unlike classical algorithms designed for bits, quantum algorithms leverage the power of superposition and entanglement. • Tackling the Intractable: These algorithms can solve certain problems exponentially faster than classical computers, especially those involving complex optimization or large simulations. • Famous Examples: Shor's Algorithm could break many encryption standards, while Grover's Algorithm can speed up search tasks. • Still Under Development: Quantum algorithms are a young field, constantly evolving and being optimized for specific tasks. • The Future is Quantum: Mastering these algorithms will unlock breakthroughs in fields like drug discovery, materials science, and financial modeling. QUANTUM ALGORITHMS
  • 24. • Decoherence is the enemy of qubits. It's the loss of their delicate quantum states due to interactions with the environment, making them behave classically (0 or 1). • Keeping it Quantum: Quantum error correction fights back. These techniques use multiple qubits to encode information redundantly, detecting and correcting errors caused by decoherence. • Like Fort Knox for Qubits: Error correction codes act like shields, protecting the fragile superposition of qubits during computations. • The Challenge Remains: Implementing effective error correction requires many extra qubits, making it a hurdle for large-scale quantum computers. • The Race is On: Researchers are constantly developing new error correction methods to pave the way for robust and reliable quantum computations. DE-COHERENCE & ERROR CORRECTION
  • 25. • Extracting the Unknown: Unlike classical bits, qubits hold probabilistic information. Measurement aims to extract this information from a qubit (or entangled qubits) existing in superposition (both 0 and 1). • Superposition Collapse: Measurement forces the "both-at-once" state to collapse. The qubit is forced into a definite state (0 or 1) – a one-way trip. • Probabilistic Outcomes: Forget certainties! We only get the probability of finding the qubit in a specific state (0 or 1) after measurement, based on its wavefunction before. • The Observer Effect: Measurement requires interaction with a device, disrupting the qubit and forcing collapse. This interaction highlights how the act of measurement itself influences the system. • Bridging Two Worlds: Quantum measurement connects the probabilistic world of qubits with the classical world of definite states. It provides information, but fundamentally alters the measured system. QUANTUM MEASUREMENT
  • 26. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 LITERATURE REVIEW
  • 27. Hash Function(s) Used Blockchain Platforms SHA-256 Bitcoin, Ripple (XRP), Bitcoin Cash, TRON, VeChain, Stellar, Algorand, NEM, Hedera Hashgraph Keccak-256 (SHA-3) Ethereum, Binance Smart Chain, Cardano, Polkadot, Solana, EOS Blake2b Binance Smart Chain, Cardano Scrypt Litecoin, Multichain CryptoNight Monero Kerl (Custom Hash Function) IOTA X11 (Combination of Hash Functions) Dash Equihash (Memory-Bound Proof-of-Work) Zcash RIPEMD-160 Bitcoin, Tezos, NEO InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 30. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 [8]: System design has been proposed that schemes a voting system on the blockchain, incorporating PQC offering a systematic and critical view towards laying down a quantum-resistant blockchain for near future online voting systems in the PQC era ahead. [9] addresses the challenge of collaborating network services with heterogeneous devices from various vendors by leveraging blockchain technology. Research also explores the integration of PQC algorithms to safeguard against future threats and demonstrates superior write performance of Quorum Blockchain by exploiting PQC algorithm shortest vector problem (SVP) in a lattice.
  • 31. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 [12]: Employs Grobner basis algorithms over finite fields, bidding better security against possible quantum attacks Grobner basis algorithms Special kind of set of polynomials that captures the essence of a larger set. Like having a bunch of complex polynomial equations & a Grobner basis renders a simplified set that holds all the essential information about the original equations, making it easier to analyze.
  • 32. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 [12]: Employs Grobner basis algorithms over finite fields, bidding better security against possible quantum attacks [13]: Concentrating specifically on Bitcoin & Ethereum, the authors demonstrate how these platforms enable primitives to ensure data integrity, authenticity, and non- repudiation and then they acknowledge the potential threat posed by emergent QC advancements. The authors foresee a future where BCT networks employ NIST- recommended PQC primitives, ascertaining their continued practicality in the QC era.
  • 33. Primitive Name Vulnerability Quantum Attack Impact on Blockchain Security Elliptic Curve Cryptography Shor's Algorithm Breaks ECC algorithms used for digital signatures and key exchange Loss of transaction integrity, unauthorized access to funds, and potential manipulation of the ledger RSA Shor's Algorithm Breaks RSA algorithms used for digital signatures and key exchange Similar impact as ECC SHA-256 Grover's Algorithm Enables finding collisions with considerably less effort Potential for forging transactions and compromising data integrity ECDSA Signatures Shor's Algorithm Breaks ECDSA signature scheme Loss of transaction authenticity and non-repudiation Merkle Trees Grover's Algorithm Speeds up finding preimages and second preimages Potential for forging transactions and compromising data integrity Proof-of-Work Grover's Algorithm Enables finding solutions to PoW puzzles with reduced computational effort Potential for mining dominance and centralization of the network
  • 34. Most PQC algorithms base their security on one or more of the mathematical problems PQC methods with different mathematical foundations Lattice Based Code Based Multivariate Polynomial Hash Based Isogeny Based Post-Quantum Key Exchange Hybrid Cryptographic Schemes Super-Singular Elliptic Curve
  • 35. Most PQC algorithms base their security on one or more of the mathematical problems Lattice Based Code Based Multivariate Polynomial Hash Based Isogeny Based Post-Quantum Key Exchange Hybrid Cryptographic Schemes Super-Singular Elliptic Curve PQC methods that are to be taken seriously belong to 5 families that differ in mathematical foundations
  • 36. • Building with Lattices: This approach leverages mathematical structures called lattices – grids of points formed by integer combinations of vectors. • Hard Problems, Secure Keys: The security of lattice-based PQC relies on the difficulty of solving specific lattice problems in polynomial time, even for quantum computers. Think complex mazes with no easy escape! • Encryption & Signatures: Lattice-based schemes offer both encryption and digital signature functionalities, crucial for secure communication and data integrity in the quantum age. • Standardization on the Horizon: Promising lattice-based PQC algorithms like CRYSTALS-KYBER and CRYSTALS-Dilithium are undergoing standardization, paving the way for real-world adoption. LATTICE IS SPECIAL TODAY
  • 37. Approaches of Post Quantum Cryptography InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Based on Description TRL Lattice Based Mathematical structures based on grids of points and Defined by basis vectors 4 Code Based Relies on error-correcting codes for its security 3 Multivariate Polynomial Employs systems of polynomial equations for cryptographic security. 2 Hash Based Leverages the collision resistance 4 Isogeny Based Involves the complexity of computing isogenies between elliptic curves. 5
  • 38. Primitive Name Potential Post-Quantum Replacement Algorithm Elliptic Curve Cryptography Lattice-based cryptography, multivariate cryptography, Supersingular Isogeny Diffie-Hellman (SIDH) RSA Lattice-based cryptography, multivariate cryptography, post-quantum RSA (PQ-RSA) SHA-256 Quantum-resistant Merkle trees ECDSA Signatures Lattice-based signatures, multivariate signatures, XMSS Merkle Trees Quantum-resistant Merkle trees with alternative collision-resistant hash functions Proof-of-Work Quantum-resistant PoW algorithms, post-quantum consensus mechanisms Potential Post-Quantum Replacement Algorithm InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 39. Mechanism Name Latency Throughput Energy Consumption Scalability Suitability for Different Blockchain Use Cases Lattice-based Moderate Moderate High Good Suitable for public and permissioned blockchains Multivariate BFT Low Moderate Low Good Suitable for resource-constrained private blockchains Isogeny Moderate High Moderate Good Suitable for high-throughput applications and public blockchains Hash-based Low Moderate Low Good Suitable for private blockchains requiring fast consensus Quantum-resistant Proof of Work (PoW) High Low High Moderate Suitable for public blockchains requiring high security and decentralization Quantum-resistant Proof of Stake (PoS) Moderate Moderate Low Good Suitable for public and permissioned blockchains PQC MECHANISMS: PERFORMANCE & SUITABILITY FOR BLOCKCHAIN
  • 40. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 CURRENT STATE
  • 41. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 43. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 44. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 45. NIST chose four finalist algorithms in July 2022 for post-quantum cryptography. The fourth standard (FALCON) will release its draft for comments in 2024. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 CRYSTALS-Kyber : Lattice method for asymmetric encryption. CRYSTALS-Dilithium : Lattice method, it is used for digital signature. FALCON : Signature method is also based on lattices. SPHINCS+ : Hash-based SPHINCS+ is another signature method NIST also identified many additional candidates to be evaluated which also include non-lattice-based choices.
  • 46. NIST chose four finalist algorithms in July 2022 for post-quantum cryptography. The fourth standard (FALCON) will release its draft for comments in 2024. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 CRYSTALS-Kyber : Lattice method for asymmetric encryption. CRYSTALS-Dilithium : Lattice method, it is used for digital signature. FALCON : Signature method is also based on lattices. SPHINCS+ : Hash-based SPHINCS+ is another signature method NIST also identified many additional candidates to be evaluated which also include non-lattice-based choices.
  • 47. In addition to NIST, German federal office BSI recommends two PQC models • Classic McEliece • FrodoKEM IETF has proposed two hash based models • XMSS (RFC 8391) • Leighton-Micali (RFC 8554) InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 48. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Literature Review Summary - 15 Papers explored with Lattice based PQC in maximum - Voting enabled on blockchain applications - Max demonstrations limited to Ethereum blockchain and few on Quoram - QKD for Quantum-Safe Smart Contracts - Mostly Theoretical frameworks - Lack of Quantum research resources - Promising and Definite association of Blockchain and PQC - Threats and repercussions to Smart Contracts - Existing Governance Mechanisms in place
  • 49. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 CHALLENGES OF IMPLEMENTING PQC IN BLOCKCHAIN
  • 50. Challenges of Implementing PQC in Blockchain — Performance and Efficiency • PQC algorithms demand more computation, potentially slowing down blockchain platforms. — Interoperability and Compatibility • Integrating PQC requires major updates to blockchain protocols for compatibility with existing systems. • Lack of standardized PQC algorithms can lead to compatibility issues across blockchain platforms. — Security Considerations in Transitioning to PQC • PQC implementations are vulnerable to side-channel attacks. — Migration • Likewise for any migration in PQC by NIST, there exists a number of challenges —Current Chip Architectures • Current card chip architectures are designed for RSA or Diffie-Hellman keys and have a corresponding coprocessor. • In contrast, they are not designed to perform lattice or, code operations, certainly not with the necessary key lengths. • Revision of current chip architectures is therefore an important challenge for the coming years InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
  • 51. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 Conclusion • Solution without a problem • Cryptoagility • Ability of a cryptographic system to rapidly adapt and evolve in response to new threats, vulnerabilities, or technological advancements • Realisation of threat by state • Harvest now Decrypt Later • Blockchain future readiness imminent • AI arrival spoils the scenario further
  • 52. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 1. H. A. Bhat, F. A. Khanday, B. K. Kaushik, F. Bashir and K. A. Shah, "Quantum Computing: Fundamentals, Implementations and Applications," in IEEE Open Journal of Nanotechnology, vol. 3, pp. 61-77, 2022, doi: 10.1109/OJNANO.2022.3178545. 2. Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 2017, pp. 557-564, doi: 10.1109/BigDataCongress.2017.85. 3. A. Khalid, S. McCarthy, M. O’Neill and W. Liu, "Lattice-based Cryptography for IoT in A Quantum World:Are We Ready?," 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), Otranto, Italy, 2019, pp. 194-199, doi: 10.1109/IWASI.2019.8791343. 4. A. Kuznetsov, A. Kiian, M. Lutsenko, I. Chepurko and S. Kavun, "Code-based cryptosys-tems from NIST PQC," 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, UKraine, 2018, pp. 282-287, doi: 10.1109/DESSERT.2018.8409145. 5. A. C. H. Chen, "Post-Quantum Cryptography Neural Network," 2023 International Confe-rence on Smart Systems for applications in Electrical Sciences (ICSSES),Tumakuru, India, 2023, pp. 1-6, doi: 10.1109/ICSSES58299.2023.10201083. 6. A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshaya and N. Nagy, "Experi-mental Implementation of Shor's Quantum Algorithm to Break RSA," 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 748-752, doi:10.1109/CICN56167.2022.10008287. 7. A. Mandviwalla, K. Ohshiro and B. Ji, "Implementing Grover’s Algorithm on the IBM Quantum Computers," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 2531-2537, doi: 10.1109/BigData.2018.8622457. 8. S. Gupta, K. K. Gupta, P. K. Shukla and M. K. Shrivas, "Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)," 2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T), Rai-pur, India, 2022, pp. 1-8, doi: 10.1109/ICPC2T53885.2022.9776966. 9. E. Zeydan, J. Baranda and J. Mangues-Bafalluy, "Post-Quantum Blockchain-Based Secure Service Orchestration in Multi-Cloud Networks," in IEEE Access, vol. 10, pp. 129520-129530, 2022, doi: 10.1109/ACCESS.2022.3228823. 10. Allende, M. et al. (2023) ‘Quantum-resistance in Blockchain Networks’, Scientific Reports, 13(1). doi:10.1038/s41598-023-32701-6. 11. T. M. Fernández-Caramès and P. Fraga-Lamas, "Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks," in IEEE Access, vol. 8, pp. 21091-21116, 2020, doi: 10.1109/ACCESS.2020.2968985. 12. J. Chen, W. Gan, M. Hu and C. -M. Chen, "On the Construction of a Post-Quantum Block-chain," 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346253. References
  • 53. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024 13. A. H. Lone and R. Naaz, "Demystifying Cryptography behind Blockchains and a Vision for Post-Quantum Blockchains," 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangluru, India, 2020, pp. 1-6, doi: 10.1109/INOCON50539.2020.9298215. 14. K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto and T. Schroeter, "Blockchained Post-Quantum Signatures," 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018, pp. 1196-1203, doi: 10.1109/Cybermatics_2018.2018.00213. 15. Xu, S., Sun, A., Ren, Z. et al. Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. J Comb Optim 45, 116 (2023). https://doi.org/10.1007/s10878-023-01047-0 16. Gharavi, H. (2023) ‘Post Quantum Blockchain Security for the internet of things survey and research directions’, JOURNAL OF IEEE COMMUNICATIONS SURVEYS & TUTORIALS [Preprint]. doi:10.36227/techrxiv.22821692.v1. 17. Buser, M. et al. (2023) ‘A survey on exotic signatures for Post-quantum Blockchain: Challenges and research directions’, ACM Computing Surveys, 55(12), pp. 1–32. doi:10.1145/3572771. 18. R. Saha et al., "A Blockchain Framework in Post-Quantum Decentralization," in IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 1-12, 1 Jan.-Feb. 2023, doi: 10.1109/TSC.2021.3116896. 19. Seok, B.; Park, J.; Park, J.H. A Lightweight Hash-Based BlockchainArchitecture for Indus-trial IoT. Appl. Sci. 2019, 9, 3740. https://doi.org/10.3390/app9183740 20. Zijlstra, T. (2020) Secure hardware accelerators for Post Quantum Cryptography, theses. Available at: https://theses.hal.science/tel-02953277v1 (Accessed: 09 Dec 2023). 21. X. Yang, B. Li, Y. Zhang, J. Wu and P. Yuan, "A Hybrid Blockchain-BasedAuthentication Scheme for Smart Home," 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 893-897, doi: 10.1109/ICSIP49896.2020.9339278. 22. Teague, T. (2022) University of Arkansas, Fayetteville scholarworks@uark, https://scholarworks.uark.edu/.Available at: https://scholarworks.uark.edu/cgi/viewcontent.cgi?article=1106&context=csceuht (Ac-cessed: 09 December 2023). 23. Swayne, M. (2024) Blockchain, Quantum Experts Develop Framework to Keep Blockchain Safe from Quantum Computers. https://thequantuminsider.com/2023/05/02/blockchain-quantum-experts-develop-framework-to-keep-blockchain-safe-from-quantum-computers/. 24. Chik, H. and Chik, H. (2022) 'Chinese blockchain platform ChainMaker says it has new technology to keep it secure from quantum attacks,' South China Morning Post, 9 June. https://www.scmp.com/news/china/science/article/3180884/chinese-blockchain-platform-chainmaker-says-it-has-new. 25. Dargan, J. (2024) BTQ & ITRI announce collaboration to develop next-generation semiconductor technology for post-quantum cryptography. https://thequantuminsider.com/2022/09/07/btq-itri-announce-collaboration-to-develop-next-generation-semiconductor-technology-for-post-quantum-cryptography/. References
  • 54. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024