Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats

anupriti 471 views 54 slides Jun 30, 2024
Slide 1
Slide 1 of 54
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54

About This Presentation

In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.

This prese...


Slide Content

International Conference on Recent Developments in Cyber Security (ReDCySec2023)
30-31 May, 2024
Organized by Center for Cyber Security and Cryptology, Sharda University
Presenter:
Paper ID:
Navigating Post-Quantum Blockchain: Resilient
Cryptography in Quantum Threats
by
Dr AnupamTiwari, Ph.D
#7
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

—Problem Statement
—Introduction
—Cryptographic Primitives in Blockchain Technology
—Vulnerabilities of current cryptography to QC attacks in Blockchain Technology
—Foundations of PQC
—Literature Review
—Current State
—Challenges
—Conclusion
International Conference on Recent Developments in Cyber Security-ReDCySec-2024
PRESENTATION LAYOUT

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
NavigatingPost-Quantum Blockchain:Resilient
CryptographyinQuantumThreats
PROBLEM STATEMENT

INTRODUCTION
—BlockchainbanksheavilyonCRYPTOGRAPHY
—Blockchainimpartsallit’swellknowncharacteristicsattributedtoCRYPTOGRAPHY
•Transparency
•Redundancy
•Accountability
•Immutability
•Decentralization
•Consensus-Proof-of-work
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

TraditionalCRYPTOGRAPHIC algorithms,whichhaveeffectively
demonstrateddataintegrityandprivacy,nowareconfrontedwith
QUANTUMCOMPUTERS
International Conference on Recent Developments in Cyber Security-ReDCySec-2024
INTRODUCTION

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
WELL KNOWN ENCRYPTION & HASHING ALGORITHMS

RSA:Basedonprimefactorization
difficulty.
AES:Utilizessubstitution-permutation
network.
DES:EmploysFeistelnetwork
structure.
ECC:Reliesonellipticcurve
properties.
Diffie-Hellman:Solvesdiscrete
logarithmproblem.
SHA:UsesMerkle-Damgårdconstruction
Blowfish:VariablekeylengthFeistel
network.
Twofish:Variablekeysizesubstitution-
permutationnetwork.
DSA:Modular exponentiationfor
signatures.
RC4:Streamcipherfordataencryption.
Well known Encryption and Hashing Algorithms
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

Where is Cryptography used in Blockchain Technology?
—HashFunctions
•DataIntegrity
•DigitalSignaturesandAuthenticity
—Public-KeyInfrastructure(PKI)andKeyExchange
•CryptographicRandomNumberGenerators
•Merkletrees
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

VULNERABILITIES OF CURRENT CRYPTOGRAPHY TO QC ATTACKS
IN
BLOCKCHAIN TECHNOLOGY
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

Vulnerabilities of Current Cryptography to QC Attacks in BCT
—Shor'sAlgorithm
•Quantumalgorithmforfactoringlargeintegers.
•ThreatenssecurityofRSAandothercryptographicschemes.
•Exponentialspeedupoverclassicalfactoringalgorithms.
•Basisforpotentialquantumattacksonmodernencryption.
•DiscoveredbyPeterShorin1994.
—Grover'sAlgorithm
•Quantumsearchalgorithmforunsorteddatabases.
•Quadraticspeedupcomparedtoclassicalsearch.
•Implicationsforbreakingsymmetrickeycryptography.
•DiscoveredbyLovGroverin1996.
Shor'salgorithmthreatens
AsymmetricEncryptionby
efficientlyfactoringlarge
numbers, compromising
security.
Grover'salgorithmposesa
threattoSymmetricEncryption
byspeedingupbrute-force
attacks, reducing its
effectiveness.
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
Asymmetric Encryption Algorithms
Symmetric Encryption Algorithms
CONTEXT PQC

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
AsymmetricEncryptionAlgorithms
•Generallymorevulnerabletoquantumthreatscomparedto
symmetricencryptionalgorithms.
•Arisesfromthefactthatmanyasymmetricencryptionalgorithmsrely
onmathematicalproblemsthatcanbeefficientlysolvedbyquantum
computers

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
SymmetricEncryptionAlgorithms
•Consideredtobelessvulnerabletoquantumthreatsbecausetheydo
notrelyonthesamemathematicalproblemsasasymmetricencryption.
•TypicallybasedonoperationssuchasPermutations,Substitutions,
andBitwiseoperationsratherthanthemathematicalproblemsthat
asymmetricencryptionalgorithmsrelyon.

Thus
•EmergenceofQuantumComputingraisesconcernsaboutthefuture
securityofblockchainnetworksrelyingontraditionalcryptographicmethods.
•Transitioningtopost-quantumcryptographicmethodsisimperativeto
ensurethecontinuedsecurityofdigitalcommunicationandassetprotection
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

Foundations of Post
Quantum Cryptography
(PQC)
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

Foundations of Post
Quantum Cryptography
(PQC) •Quantumcryptographyreliesonthe
principlesofquantummechanicsto
securecommunicationchannels.
•Unlikeclassicalcryptography,quantum
cryptographyutilizesthebehaviorof
particleslikephotonstocreatesecure
communicationprotocols.
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

•Qubits
•Superposition
•Entanglement
•Quantum Gates
•Quantum Algorithms
•De-coherence & Error Correction
•Quantum Measurement
Foundations of Post
Quantum Cryptography
(PQC)
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

•Qubits:Quantumcomputing'score,likeclassicalbits
•Superposition:Qubitscanrepresent0and1simultaneously,boostingcomputationalpower.
•Entanglement:Qubitscanbecorrelatedregardlessofdistance,enhancingcomputationalcapabilities.
•QuantumGates:Manipulatequbitstoperformoperationslikeclassicallogicgates.
•QuantumAlgorithms:Leveragequbitstosolveproblemsexponentiallyfasterthanclassicalmethods.
•De-coherence&ErrorCorrection:Techniquescounteracterrorscausedbyenvironmentalfactors.
•QuantumMeasurement:Processcollapsesqubitstates,providingclassicaloutputfromquantum
computations.
Foundations of PQC
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

•Intheworldofcomputers,informationisbuiltonbits,tinyswitchesthatareeitheron(1)oroff(0).
•Quantumcomputerstakethingsastepfurtherwithqubits.Thesearelikebits,butweirder.
•Aqubitcanbe1,0,orbothatthesametime(superposition),thankstothestrangenessofquantum
mechanics.Imagineacoinspinning–it'sbothheadsandtailsuntilyoustopitandlook.
•Thisletsqubitsexploremanypossibilitiessimultaneously,makingthemsuperchargedfortackling
problemsthatwouldtakeregularcomputersforever.
•Here'sthecatch:qubitsaredelicate.Measuringthemforcesthemtobea1or0,collapsingtheir
superposition.Butifwecanharnessthem,theyholdimmensepotentialforrevolutionizingfieldslike
medicine,materialsscience,andcryptography.Thinkofitasunlockingawholenewwayofprocessing
information,withqubitsasthekey.
QUBITS

•QubitsvsBits:Qubits,thebuildingblocksofquantumcomputers,differfromclassicalbits.Whilebits
arerestrictedto0or1,qubitscanbeinasuperpositionofbothstatesatonce.
•SuperpositionExplained:This"both-at-once"statearisesfromquantummechanics.Mathematically,a
qubit'sstateisacombinationof|0>and|1>withprobabilitiesencodedbycomplexnumbers(amplitudes).
•BasisStates:The|0>and|1>statesarethefoundationforqubits.Theyactasreferencepointsfor
describingmorecomplexquantumstates.
•BlochSphereVisualization:Thismathematicaltooldepictsaqubit'sstateasapointonasphere.The
positiondependsontheamplitudesassociatedwiththebasisstates.
•ParallelProcessingPower:Superpositionallowsmultiplequbitstoexplorenumerouspossibilities
simultaneously.Thisunlockstheabilitytotackleproblemsthatwouldoverwhelmclassicalcomputers.
•FragileNature:Measuringaqubitforcesittocollapseintoadefinitestate(0or1),destroyingthe
superposition.Carefulcontrolisneededtoharnessitspotential.
SUPERPOSITION

•TwinQubits:Imaginetwoqubitslinkedliketwins.Thisisentanglement,wheretheirfatesare
connected.
•InstantaneousConnection:Achangeinoneentangledqubitinstantlyaffectstheother,nomatterthe
distance.(Think:Separatedcoinsflippingthesamewayeverytime!)
•NotTeleportation:Entanglementdoesn'ttransmitinformationfasterthanlight,butallowsforpowerful
correlationsinquantumalgorithms.
•BeyondBits:Unlikeclassicalbits,entangledqubitsshareasinglequantumstate,defyingclassical
physics.
•UnlockingPotential:Entanglementholdspromiseforsecurecommunicationandsolvingcomplex
problemsinvariousfields.
ENTANGLEMENT: SPOOKY ACTION AT A DISTANCE

•TheToolsoftheTrade:Quantumgatesarelikelogicgatesinclassicalcomputers,butforqubits.They
manipulatethesuperpositionandentanglementofqubits.
•FlippingandCombining:CommongateslikeHadamardandCNOTcanflipaqubit'sstate(0to1or
viceversa)orcombinethestatesoftwoentangledqubits.
•BuildingQuantumCircuits:Bycombiningdifferentgatesinspecificsequences,wecreatequantum
circuitstoperformcomplexcalculations.
•UnlockingPotential:Quantumgatesallowustocontrolandorchestratetheuniquepropertiesof
qubits,pavingthewayforsolvingproblemsintractableforclassicalcomputers.
•PrecisionisKey:Quantumgatesaredelicate,requiringprecisecontroltomaintainthefragilequantum
statesofqubits.
QUANTUM GATES: THE ARCHITECTS OF QUBIT MAGIC

•BeyondClassicalLimits:Unlikeclassicalalgorithmsdesignedforbits,quantumalgorithmsleverage
thepowerofsuperpositionandentanglement.
•TacklingtheIntractable:Thesealgorithmscansolvecertainproblemsexponentiallyfasterthan
classicalcomputers,especiallythoseinvolvingcomplexoptimizationorlargesimulations.
•FamousExamples:Shor'sAlgorithmcouldbreakmanyencryptionstandards,whileGrover'sAlgorithm
canspeedupsearchtasks.
•StillUnderDevelopment:Quantumalgorithmsareayoungfield,constantlyevolvingandbeing
optimizedforspecifictasks.
•TheFutureisQuantum:Masteringthesealgorithmswillunlockbreakthroughsinfieldslikedrug
discovery,materialsscience,andfinancialmodeling.
QUANTUM ALGORITHMS

•Decoherenceistheenemyofqubits.It'sthelossoftheirdelicatequantumstatesduetointeractions
withtheenvironment,makingthembehaveclassically(0or1).
•KeepingitQuantum:Quantumerrorcorrectionfightsback.Thesetechniquesusemultiplequbitsto
encodeinformationredundantly,detectingandcorrectingerrorscausedbydecoherence.
•LikeFortKnoxforQubits:Errorcorrectioncodesactlikeshields,protectingthefragilesuperposition
ofqubitsduringcomputations.
•TheChallengeRemains:Implementingeffectiveerrorcorrectionrequiresmanyextraqubits,makingit
ahurdleforlarge-scalequantumcomputers.
•TheRaceisOn:Researchersareconstantlydevelopingnewerrorcorrectionmethodstopavetheway
forrobustandreliablequantumcomputations.
DE-COHERENCE & ERROR CORRECTION

•ExtractingtheUnknown:Unlikeclassicalbits,qubitsholdprobabilisticinformation.Measurement
aimstoextractthisinformationfromaqubit(orentangledqubits)existinginsuperposition(both0and1).
•SuperpositionCollapse:Measurementforcesthe"both-at-once"statetocollapse.Thequbitisforced
intoadefinitestate(0or1)–aone-waytrip.
•ProbabilisticOutcomes:Forgetcertainties!Weonlygettheprobabilityoffindingthequbitinaspecific
state(0or1)aftermeasurement,basedonitswavefunctionbefore.
•TheObserverEffect:Measurementrequiresinteractionwithadevice,disruptingthequbitandforcing
collapse.Thisinteractionhighlightshowtheactofmeasurementitselfinfluencesthesystem.
•BridgingTwoWorlds:Quantummeasurementconnectstheprobabilisticworldofqubitswiththe
classicalworldofdefinitestates.Itprovidesinformation,butfundamentallyaltersthemeasuredsystem.
QUANTUM MEASUREMENT

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
LITERATURE REVIEW

Hash Function(s) Used Blockchain Platforms
SHA-256
Bitcoin, Ripple (XRP), Bitcoin Cash, TRON, VeChain,
Stellar, Algorand, NEM, Hedera Hashgraph
Keccak-256 (SHA-3)
Ethereum, Binance Smart Chain, Cardano, Polkadot,
Solana, EOS
Blake2b Binance Smart Chain, Cardano
Scrypt Litecoin, Multichain
CryptoNight Monero
Kerl (Custom Hash Function) IOTA
X11 (Combination of Hash Functions) Dash
Equihash (Memory-Bound Proof-of-Work) Zcash
RIPEMD-160 Bitcoin, Tezos, NEO
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
[8]:Systemdesignhasbeenproposedthatschemesavotingsystemonthe
blockchain,incorporatingPQCofferingasystematicandcriticalviewtowardslaying
downaquantum-resistantblockchainfornearfutureonlinevotingsystemsinthe
PQCeraahead.
[9]addressesthechallengeofcollaboratingnetworkserviceswithheterogeneous
devicesfromvariousvendorsbyleveragingblockchaintechnology.
ResearchalsoexplorestheintegrationofPQCalgorithmstosafeguardagainst
futurethreatsanddemonstratessuperiorwriteperformanceofQuorumBlockchain
byexploitingPQCalgorithmshortestvectorproblem(SVP)inalattice.

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
[12]:EmploysGrobnerbasisalgorithmsoverfinitefields,biddingbettersecurity
againstpossiblequantumattacks
Grobnerbasisalgorithms
Specialkindofsetofpolynomialsthatcapturesthe
essenceofalargerset.Likehavingabunchofcomplex
polynomialequations&aGrobnerbasisrendersa
simplifiedsetthatholdsalltheessential
informationabouttheoriginalequations,makingit
easiertoanalyze.

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
[12]:EmploysGrobnerbasisalgorithmsoverfinitefields,biddingbettersecurity
againstpossiblequantumattacks
[13]:ConcentratingspecificallyonBitcoin&Ethereum,theauthorsdemonstratehow
theseplatformsenableprimitivestoensuredataintegrity,authenticity,andnon-
repudiationandthentheyacknowledgethepotentialthreatposedbyemergentQC
advancements.TheauthorsforeseeafuturewhereBCTnetworksemployNIST-
recommendedPQCprimitives,ascertainingtheircontinuedpracticalityintheQCera.

Primitive Name Vulnerability Quantum Attack Impact on Blockchain Security
Elliptic Curve
Cryptography
Shor'sAlgorithm
Breaks ECC algorithms used for digital
signatures and key exchange
Loss of transaction integrity, unauthorized access to
funds, and potential manipulation of the ledger
RSA Shor's Algorithm
Breaks RSA algorithms used for digital
signatures and key exchange
Similar impact as ECC
SHA-256 Grover's Algorithm
Enables finding collisions with
considerably less effort
Potential for forging transactions and compromising
data integrity
ECDSA Signatures Shor's Algorithm Breaks ECDSA signature scheme Loss of transaction authenticity and non-repudiation
MerkleTrees Grover's Algorithm
Speeds up finding preimages and
second preimages
Potential for forging transactions and compromising
data integrity
Proof-of-Work Grover's Algorithm
Enables finding solutions to PoW
puzzles with reduced computational
effort
Potential for mining dominance and centralization of
the network

Most PQC algorithms base
their security on one or
more of the mathematical
problems
PQC methods with
differentmathematical
foundations
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
IsogenyBased
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve

Most PQC algorithms base
their security on one or
more of the mathematical
problems
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
IsogenyBased
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve
PQCmethodsthataretobe
takenseriouslybelongto5
familiesthatdifferin
mathematicalfoundations

•BuildingwithLattices:Thisapproachleveragesmathematicalstructurescalledlattices–gridsof
pointsformedbyintegercombinationsofvectors.
•HardProblems,SecureKeys:Thesecurityoflattice-basedPQCreliesonthedifficultyofsolving
specificlatticeproblemsinpolynomialtime,evenforquantumcomputers.Thinkcomplexmazeswithno
easyescape!
•Encryption&Signatures:Lattice-basedschemesofferbothencryptionanddigitalsignature
functionalities,crucialforsecurecommunicationanddataintegrityinthequantumage.
•StandardizationontheHorizon:Promisinglattice-basedPQCalgorithmslikeCRYSTALS-KYBERand
CRYSTALS-Dilithiumareundergoingstandardization,pavingthewayforreal-worldadoption.
LATTICE IS SPECIAL TODAY

Approaches of Post Quantum Cryptography
International Conference on Recent Developments in Cyber Security-ReDCySec-2024
Based on Description TRL
Lattice Based Mathematical structures based on grids of points andDefined by basis
vectors
4
Code Based Relies on error-correcting codes for its security 3
Multivariate Polynomial Employs systems of polynomial equations for cryptographic security.2
Hash Based Leverages the collision resistance 4
IsogenyBased Involves the complexity of computing isogenies between elliptic curves. 5

Primitive Name Potential Post-Quantum Replacement Algorithm
Elliptic Curve Cryptography
Lattice-based cryptography, multivariate cryptography, Supersingular
Isogeny Diffie-Hellman (SIDH)
RSA
Lattice-based cryptography, multivariate cryptography, post-quantum RSA
(PQ-RSA)
SHA-256 Quantum-resistant Merkletrees
ECDSA Signatures Lattice-based signatures, multivariate signatures, XMSS
Merkle Trees
Quantum-resistant Merkletrees with alternative collision-resistant hash
functions
Proof-of-Work
Quantum-resistant PoWalgorithms, post-quantum consensus
mechanisms
Potential Post-Quantum Replacement Algorithm
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

Mechanism Name Latency Throughput
Energy
Consumption
Scalability
Suitability for Different Blockchain Use
Cases
Lattice-based Moderate Moderate High Good
Suitable for public and permissioned
blockchains
Multivariate BFT Low Moderate Low Good
Suitable for resource-constrained private
blockchains
Isogeny Moderate High Moderate Good
Suitable for high-throughput applications
and public blockchains
Hash-based Low Moderate Low Good
Suitable for private blockchainsrequiring
fast consensus
Quantum-resistant
Proof of Work (PoW)
High Low High Moderate
Suitable for public blockchainsrequiring
high security and decentralization
Quantum-resistant
Proof of Stake (PoS)
Moderate Moderate Low Good
Suitable for public and permissioned
blockchains
PQC MECHANISMS: PERFORMANCE & SUITABILITY FOR BLOCKCHAIN

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
CURRENT STATE

International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024

NISTchosefourfinalistalgorithmsinJuly2022forpost-quantumcryptography.
Thefourthstandard(FALCON)willreleaseitsdraftforcommentsin2024.
International Conference on Recent Developments in Cyber Security-ReDCySec-2024
CRYSTALS-Kyber : Latticemethod for asymmetric encryption.
CRYSTALS-Dilithium: Latticemethod, it is used for digital signature.
FALCON : Signature method is also based on lattices.
SPHINCS+ : Hash-basedSPHINCS+ is another signature method
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.

NISTchosefourfinalistalgorithmsinJuly2022forpost-quantumcryptography.
Thefourthstandard(FALCON)willreleaseitsdraftforcommentsin2024.
International Conference on Recent Developments in Cyber Security-ReDCySec-2024
CRYSTALS-Kyber : Latticemethod for asymmetric encryption.
CRYSTALS-Dilithium: Latticemethod, it is used for digitalsignature.
FALCON : Signaturemethod is also based on lattices.
SPHINCS+ : Hash-basedSPHINCS+ is another signaturemethod
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.

InadditiontoNIST,GermanfederalofficeBSIrecommendstwoPQCmodels
• ClassicMcEliece
• FrodoKEM
IETFhasproposedtwohashbasedmodels
• XMSS(RFC8391)
• Leighton-Micali(RFC8554)
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
Literature Review Summary
-15 Papers explored with Lattice based PQC in maximum
-Voting enabled on blockchain applications
-Max demonstrations limited to Ethereumblockchain and few on Quoram
-QKD for Quantum-Safe Smart Contracts
-Mostly Theoretical frameworks
-Lack of Quantum research resources
-Promising and Definite association of Blockchain and PQC
-Threats and repercussions to Smart Contracts
-Existing Governance Mechanisms in place

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
CHALLENGES OF IMPLEMENTING PQC IN BLOCKCHAIN

Challenges of Implementing PQC in Blockchain
—PerformanceandEfficiency
•PQCalgorithmsdemandmorecomputation,potentiallyslowingdownblockchainplatforms.
—InteroperabilityandCompatibility
•IntegratingPQCrequiresmajorupdatestoblockchainprotocolsforcompatibilitywithexistingsystems.
•LackofstandardizedPQCalgorithmscanleadtocompatibilityissuesacrossblockchainplatforms.
—SecurityConsiderationsinTransitioningtoPQC
•PQCimplementationsarevulnerabletoside-channelattacks.
—Migration
•LikewiseforanymigrationinPQCbyNIST,thereexistsanumberofchallenges
—CurrentChipArchitectures
•CurrentcardchiparchitecturesaredesignedforRSAorDiffie-Hellmankeysandhaveacorrespondingcoprocessor.
•Incontrast,theyarenotdesignedtoperformlatticeor,codeoperations,certainlynotwiththenecessarykeylengths.
•Revisionofcurrentchiparchitecturesisthereforeanimportantchallengeforthecomingyears
International Conference on Recent Developments in Cyber Security-ReDCySec-2024

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
Conclusion
•Solution without a problem
•Cryptoagility
•Ability of a cryptographic system to rapidly adapt and evolve in response to new
threats, vulnerabilities, or technological advancements
•Realisationof threat by state
•Harvest now Decrypt Later
•Blockchain future readiness imminent
•AI arrival spoils the scenario further

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
1. H. A. Bhat, F. A. Khanday, B. K. Kaushik, F. Bashirand K. A. Shah, "Quantum Computing: Fundamentals, Implementations and Applications," in IEEE Open Journal
of Nanotechnology, vol. 3, pp. 61-77, 2022, doi: 10.1109/OJNANO.2022.3178545.
2. Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International
Congress on Big Data (BigDataCongress), Honolulu, HI, USA, 2017, pp. 557-564, doi: 10.1109/BigDataCongress.2017.85.
3. A. Khalid, S. McCarthy, M. O’Neill and W. Liu, "Lattice-based Cryptography for IoTin A Quantum World: Are We Ready?," 2019 IEEE 8th International Workshop on
Advances in Sensors and Interfaces (IWASI), Otranto, Italy, 2019, pp. 194-199, doi: 10.1109/IWASI.2019.8791343.
4. A. Kuznetsov, A. Kiian, M. Lutsenko, I. Chepurkoand S. Kavun, "Code-based cryptosys-temsfrom NIST PQC," 2018 IEEE 9th International Conference on
Dependable Systems, Services and Technologies (DESSERT), Kyiv, UKraine, 2018, pp. 282-287, doi: 10.1109/DESSERT.2018.8409145.
5. A. C. H. Chen, "Post-Quantum Cryptography Neural Network," 2023 International Confe-renceon Smart Systems for applications in Electrical Sciences
(ICSSES),Tumakuru, India, 2023, pp. 1-6, doi: 10.1109/ICSSES58299.2023.10201083.
6. A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshayaand N. Nagy, "Experi-mental Implementation of Shor'sQuantum Algorithm to Break RSA," 2022 14th
International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 748-752,
doi:10.1109/CICN56167.2022.10008287.
7. A. Mandviwalla, K. Ohshiroand B. Ji, "Implementing Grover’s Algorithm on the IBM
Quantum Computers," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 2531-2537, doi: 10.1109/BigData.2018.8622457.
8. S. Gupta, K. K. Gupta, P. K. Shuklaand M. K. Shrivas, "Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)," 2022 Second
International Conference on Power, Control and Computing Technologies (ICPC2T), Rai-pur, India, 2022, pp. 1-8, doi: 10.1109/ICPC2T53885.2022.9776966.
9. E. Zeydan, J. Barandaand J. Mangues-Bafalluy, "Post-Quantum Blockchain-Based Secure Service Orchestration in Multi-Cloud Networks," in IEEE Access, vol. 10,
pp. 129520-129530, 2022, doi: 10.1109/ACCESS.2022.3228823.
10. Allende, M. et al. (2023) ‘Quantum-resistance in Blockchain Networks’, Scientific Reports, 13(1). doi:10.1038/s41598-023-32701-6.
11. T. M. Fernández-Caramèsand P. Fraga-Lamas, "Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing
Attacks," in IEEE Access, vol. 8, pp. 21091-21116, 2020, doi: 10.1109/ACCESS.2020.2968985.
12. J. Chen, W. Gan, M. Huand C. -M. Chen, "On the Construction of a Post-Quantum Block-chain," 2021 IEEE Conference on Dependable and Secure Computing
(DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346253.
References

International Conference on Recent Developments in Cyber Security-ReDCySec-2024
13. A. H. Lone and R. Naaz, "Demystifying Cryptography behind Blockchainsand a Vision for Post-Quantum Blockchains," 2020 IEEE International Conference for
Innovationin Technology(INOCON),Bangluru,India, 2020, pp. 1-6, doi:
10.1109/INOCON50539.2020.9298215.
14. K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto and T. Schroeter, "BlockchainedPost-Quantum Signatures," 2018 IEEE International Conference on Internet
of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), Halifax, NS, Canada, 2018, pp. 1196-1203, doi: 10.1109/Cybermatics_2018.2018.00213.
15. Xu, S., Sun, A., Ren, Z. et al. Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. J Comb Optim45,
116 (2023). https://doi.org/10.1007/s10878-023-01047-0
16. Gharavi, H. (2023) ‘Post Quantum Blockchain Security for the internet of things survey and research directions’, JOURNAL OF IEEE COMMUNICATIONS
SURVEYS & TUTORIALS [Preprint]. doi:10.36227/techrxiv.22821692.v1.
17. Buser, M. et al. (2023) ‘A survey on exotic signatures for Post-quantum Blockchain: Challenges and research directions’, ACM Computing Surveys, 55(12), pp. 1–32.
doi:10.1145/3572771.
18. R. Sahaet al., "A Blockchain Framework in Post-Quantum Decentralization," in IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 1-12, 1 Jan.-Feb.
2023, doi: 10.1109/TSC.2021.3116896.
19. Seok, B.; Park, J.; Park, J.H. A Lightweight Hash-Based Blockchain Architecture for Indus-trial IoT. Appl. Sci. 2019, 9, 3740. https://doi.org/10.3390/app9183740
20. Zijlstra, T. (2020) Secure hardware accelerators for Post Quantum Cryptography, theses. Available at: https://theses.hal.science/tel-02953277v1 (Accessed: 09 Dec
2023).
21. X. Yang, B. Li, Y. Zhang, J. Wu and P. Yuan, "A Hybrid Blockchain-Based Authentication Scheme for Smart Home," 2020 IEEE 5thInternational Conference on
Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 893-897, doi: 10.1109/ICSIP49896.2020.9339278.
22. Teague, T. (2022) University of Arkansas, Fayetteville scholarworks@uark, https://scholarworks.uark.edu/. Available at:
https://scholarworks.uark.edu/cgi/viewcontent.cgi?article=1106&context=csceuht (Ac-cessed: 09 December 2023).
23. Swayne, M. (2024) Blockchain, Quantum Experts Develop Framework to Keep Blockchain Safe from Quantum Computers.
https://thequantuminsider.com/2023/05/02/blockchain-quantum-experts-develop-framework-to-keep-blockchain-safe-from-quantum-computers/.
24. Chik, H. and Chik, H. (2022) 'Chinese blockchain platform ChainMakersays it has new technology to keep it secure from quantum attacks,' South China Morning
Post, 9 June. https://www.scmp.com/news/china/science/article/3180884/chinese-blockchain-platform-chainmaker-says-it-has-new.
25. Dargan, J. (2024) BTQ & ITRI announce collaboration to develop next-generation semiconductor technology for post-quantum cryptography.
https://thequantuminsider.com/2022/09/07/btq-itri-announce-collaboration-to-develop-next-generation-semiconductor-technology-for-post-quantum-cryptography/.
References

International Conference on Recent Developments in Cyber Security-ReDCySec-2024