Main Article Content

Abstract

Quantum Computers are designed to be sufficiently large to be able to efficiently solve specific problems that would take an impractical amount of time to solve using classical computers. The most widely discussed application of quantum computing technology is more powerful algorithms, which efficiently solves all instances of integer factorization—a number theoretic problem that is the foundation of the most of the existing public-key encryption schemes. This means that all public-key cryptographic systems commonly used on the Internet for security will become as insecure as an open communication channel, easy to eavesdrop on or to tamper with. Moreover, traffic passes through numerous fixed, mobile and personal sensors connected to the Internet. This extremely large amount of data becomes the “air” of IoT and only a small part of it will be automatically analysed for a specific purpose. Nevertheless, an important part of the immense amount of data exchanged across the network is sensitive. Presently, these data communication and storage are protected by encryption, but that means of protection will be lost to a future quantum adversary. Because of these urgent necessities, products implementing quantum-resistant security solutions can be built and put into operation in a “post-quantum world”. This must be done now because cryptography research is currently inventing and standardizing new cryptographic algorithms. Once the new algorithms are widely and publicly agreed upon, systems with old encryption will remain vulnerable. This topic is motivated by the above.

Keywords

IoT Future-Proof Encryption Quantum Threats Monolithic Core Port Layer

Article Details

How to Cite
[1]
Noor Thamer Mahmood, “Securing IoT Devices against Quantum Threats:Developing a Framework for Future-Proof Encryption”, Cybersys. J, vol. 2, no. 2, pp. 106–120, Dec. 2025, doi: 10.57238/csj.2025.1019.

How to Cite

[1]
Noor Thamer Mahmood, “Securing IoT Devices against Quantum Threats:Developing a Framework for Future-Proof Encryption”, Cybersys. J, vol. 2, no. 2, pp. 106–120, Dec. 2025, doi: 10.57238/csj.2025.1019.

References

  1. L. Chen et al., “Report on Post-Quantum Cryptography,” NISTIR 8105, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2016.doi: http://dx.doi.org/10.6028/NIST.IR.8105
  2. D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography, Springer, Berlin, Germany, 2009.
  3. M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, Sep.–Oct. 2018.doi: https://doi.org/10.1109/msp.2018.3761723
  4. R. Perlner and D. Cooper, “Quantum-resistant public-key cryptography,” in Proc. NIST Workshop on Cybersecurity in a Post-Quantum World, Gaithersburg, MD, USA, 2015.doi: https://doi.org/10.1145/1527017.1527028
  5. E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, “Post-quantum key exchange—A new hope,” 25th USENIX Security Symposium, pp. 327–343, 2016
  6. P. Schwabe, D. Stebila, and T. Wiggers, “Post-quantum TLS without handshake signatures,” Proc. ACM CCS, pp. 1461–1480, 2020.doi: https://doi.org/10.1145/3372297.3423350
  7. A. Bindel, J. Brendel, M. Fischlin, and D. Gonçalves, “Hybrid key encapsulation mechanisms and authenticated key exchange,” IACR Cryptology ePrint Archive, Report 2019/016.doi: https://doi.org/10.1007/978-3-030-25510-7_12
  8. J. Ding and J. Buchmann, “Post-quantum cryptography for constrained devices,” IEEE Security & Privacy Workshops, pp. 33–40, 2018.doi: https://doi.org/10.5220/0010903000003120
  9. I. Şafak, F. Alagöz, and E. Anarim, “Post-Quantum Security Measures for the Internet of Things,” in Encyclopedia of Information Science and Technology, 6th ed., IGI Global, 2025, pp. 1–44, doi: https://doi.org/1010.4018/978-1-6684-7366-5.ch075
  10. A. Alomari and S. A. P. Kumar, “Securing IoT systems in a post‑quantum environment: Vulnerabilities, attacks, and possible solutions,” Internet of Things, vol. 25, no. C, art. 101132, Apr. 2024, doi: https://doi.org/1010.1016/j.iot.2024.101132.
  11. Y. Liu, K. Gai, L. Qiu, and M. Qiu, “Security and privacy issues of IoT: A survey,” Future Generation Computer Systems, vol. 95, pp. 846–859, Jun. 2019.
  12. S. Singh, P. K. Sharma, and J. H. Park, “Security issues and challenges in IoT-based environments,” IEEE Access, vol. 5, pp. 16394–16415, 2017.
  13. S. Kumari, M. Singh, R. Singh, and H. Tewari, “Post-quantum cryptography techniques for secure communication in resource-constrained IoT devices: A comprehensive survey,” Software: Practice and Experience, vol. 52, no. 10, pp. 2047–2076, 2022.
  14. J.-A. Septien-Hernandez et al., “A comparative study of post-quantum cryptosystems for Internet-of-Things applications,” Sensors, vol. 22, no. 2, art. 489, 2022.doi: https://doi.org/10.3390/s22020489
  15. R. Asif, “Post‑Quantum Cryptosystems for Internet‑of‑Things: A Survey on Lattice‑Based Algorithms,” IoT, vol. 2, no. 1, pp. 71–91, Feb. 2021, doi: https://doi.org/1010.3390/iot2010005
  16. NIST, “Post-Quantum Cryptography Standardization,” National Institute of Standards and Technology, 2022.
  17. D. Stebila, J. Chung, J. Baek, and J. Uher, “TLS hybrid design for post-quantum cryptography,” IEEE European Symposium on Security and Privacy, 2019.
  18. M. Campagna, et al., “Quantum-safe cryptography and security,” ETSI White Paper No. 8, European Telecommunications Standards Institute (ETSI), 2015. [Online]. Available: https://www.etsi.org/white-papers
  19. P. Nguyen and B. Vallée, “The LLL algorithm: Survey and applications,” Information and CommunicationsSecurity, Springer, 2010.
  20. J. Hoffstein, J. Pipher, and J. H. Silverman, An Introduction to Mathematical Cryptography, 2nd ed., Springer, 2014.