ENCRYPTION APOCALYPSE? PREPARING DATA SECURITY FOR THE QUANTUM COMPUTING ERA
Abstract
The imminent maturation of quantum computing threatens to nullify the mathematical hardness underpinning global Public Key Infrastructure, creating an urgent “Harvest Now, Decrypt Later” vulnerability. This study investigates the operational feasibility of transitioning to NIST-standardized Post-Quantum Cryptography (PQC) protocols within heterogeneous network environments. Utilizing a rigorous quantitative benchmarking framework, we evaluated the performance of lattice-based primitives, specifically ML-KEM and ML-DSA, against classical standards across high-performance servers and resource-constrained IoT devices. Empirical data reveals a fundamental architectural paradigm shift: while PQC algorithms exhibit superior computational execution speeds, they introduce severe transmission overheads, resulting in memory saturation and packet fragmentation on edge hardware. Results demonstrate that hybrid encryption schemes provide valid risk mitigation but incur statistically significant latency penalties due to expanded artifact sizes. We definitively conclude that the “Encryption Apocalypse” is primarily a bandwidth and memory bottleneck rather than a computational one, mandating the immediate deployment of adaptive crypto-agility frameworks to manage the infrastructural constraints of the post-quantum era.
Full text article
References
Abood, E. W., Yassin, A. A., Abduljabbar, Z. A., Nyangaresi, V. O., & Ali, A. H. (2025). Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. MethodsX, 15, 103631. https://doi.org/10.1016/j.mex.2025.103631
Asim, M., Junsheng, W., Weigang, L., Zhijun, L., Peng, Z., Hao, H., Dong, W., & Mohi-ud-Din, G. (2026). Quantum-resistant blockchain architecture for secure vehicular networks: A ML-KEM-enabled approach with PoA and PoP consensus. Future Generation Computer Systems, 180, 108391. https://doi.org/10.1016/j.future.2026.108391
Aslam, A. M., Bhardwaj, A., & Chaudhary, R. (2025). Quantum-resilient blockchain-enabled secure communication framework for connected autonomous vehicles using post-quantum cryptography. Vehicular Communications, 52, 100880. https://doi.org/10.1016/j.vehcom.2025.100880
Astarloa, A., Lázaro, J., & Gárate, J. I. (2025). CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems. Internet of Things, 33, 101656. https://doi.org/10.1016/j.iot.2025.101656
Bandaru, M., Mathe, S. E., & Wattanapanich, C. (2024). Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs. Computers and Electrical Engineering, 120, 109826. https://doi.org/10.1016/j.compeleceng.2024.109826
Castiglione, A., & Elia, T. (2025). Securing in-vehicle communications through post-quantum cryptography and network segmentation. Computers and Electrical Engineering, 126, 110488. https://doi.org/10.1016/j.compeleceng.2025.110488
Chelliah, P. R., & Sharma, R. K. (2025). Chapter One—A technical perspective on post-quantum cryptography (PQC) algorithms for the quantum era. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 1–24). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.004
Chouhan, V., Aldarwbi, M., Sadeghi, S., Ghorbani, A., Chow, A., & Burko, R. (2026). Assessing the quantum readiness of cryptographic standards: Recommendations toward quantum-era compliance. Computer Standards & Interfaces, 97, 104114. https://doi.org/10.1016/j.csi.2025.104114
Cíbik, P., Ricci, S., Dobiáš, P., Hajný, J., Malina, L., & Havlín, J. (2025). Quantum-resistant hardware-accelerated IoT traffic encryptor. Internet of Things, 31, 101554. https://doi.org/10.1016/j.iot.2025.101554
Farooq, S., Altaf, A., Shoaib, M., Iqbal, F., Samee, N. A., Alohali, M. A., & Ashraf, I. (2025). Analyzing post-quantum cryptographic algorithms efficiency for transport security layer. Computers and Electrical Engineering, 125, 110437. https://doi.org/10.1016/j.compeleceng.2025.110437
Hamza, R., Alotaibi, A., & Muhammad, K. (2026). A practical multi-layered framework for post-quantum secure machine learning. Engineering Applications of Artificial Intelligence, 163, 113044. https://doi.org/10.1016/j.engappai.2025.113044
Hanna, Y., Bozhko, J., Tonyali, S., Harrilal-Parchment, R., Cebe, M., & Akkaya, K. (2025). A comprehensive and realistic performance evaluation of post-quantum security for consumer IoT devices. Internet of Things, 33, 101650. https://doi.org/10.1016/j.iot.2025.101650
Hussain, M. S., Arockiasamy, K., & Kanimozhi, G. (2025). Chapter 4—Post quantum cryptography for data safeguarding. In R. Buyya & S. S. Gill (Eds.), Quantum Computing (pp. 69–80). Morgan Kaufmann. https://doi.org/10.1016/B978-0-443-29096-1.00009-X
Khawar, M., Khalid, S., Rehman, M. U., Usman, A., Malwi, W. A., & Asiri, F. (2026). Shaping the future of cybersecurity: The convergence of AI, quantum computing, and ethical frameworks for a secure digital era. Computer Science Review, 60, 100882. https://doi.org/10.1016/j.cosrev.2025.100882
Ktari, J., frikha, T., Hamdi, M., Affes, N., & Hamam, H. (2025). Enhancing Blockchain Security and Efficiency through FPGA-based Consensus Mechanisms and Post-quantum Cryptography. Recent Advances in Electrical and Electronic Engineering, 18(7), 946–958. https://doi.org/10.2174/0123520965288815240424054237
Kundu, S., Gupta, T., Sardar, A., Bandyopadhyay, A., Swain, S., & Mallik, S. (2025). A survey on quantum computing: Transforming cryptography, AI/ML, blockchain, and network communication. Franklin Open, 12, 100371. https://doi.org/10.1016/j.fraope.2025.100371
Ma, C., Shankar, A., Kumari, S., & Chen, C.-M. (2024). A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security. Internet of Things, 28, 101391. https://doi.org/10.1016/j.iot.2024.101391
Montenegro, J. A., Rios, R., & Bonilla, J. (2026). Comparative analysis of post-quantum handshake performance in QUIC and TLS protocols. Computer Networks, 275, 111957. https://doi.org/10.1016/j.comnet.2025.111957
Montenegro, J. A., Rios, R., & Lopez-Cerezo, J. (2026). A performance evaluation framework for post-quantum TLS. Future Generation Computer Systems, 175, 108062. https://doi.org/10.1016/j.future.2025.108062
Moon, S. Y., Jo, B. H., Azzaoui, A. E., Singh, S. K., & Park, J. H. (2025). Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions. Computers, Materials and Continua, 84(1), 25–55. https://doi.org/10.32604/cmc.2025.062966
Peelam, M. S., Chaurasia, B. K., Shukla, M. M., & Chamola, V. (2026). Enhancing quantum-resistant data privacy in vehicular cloud networks using NIST-qualified FALCON algorithm. Vehicular Communications, 58, 100995. https://doi.org/10.1016/j.vehcom.2025.100995
Prajapat, S., Thakur, G., Kumar, P., Das, A. K., Jamal, S. S., & Susilo, W. (2025). Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Computers and Electrical Engineering, 123, 110028. https://doi.org/10.1016/j.compeleceng.2024.110028
Prakash, P. S., Rao, P. K., Gokaramaiah, T., B? Khan, S. B., Alojail, M., & Shabaz, M. (2025). Enhancing computation and security in MEC-Aided IoT for medical imaging with QCNNs and post-Quantum cryptography. Internet of Things, 34, 101810. https://doi.org/10.1016/j.iot.2025.101810
Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000. https://doi.org/10.1016/j.dcan.2022.12.003
Rubio García, C., Rommel, S., Takarabt, S., Vegas Olmos, J. J., Guilley, S., Nguyen, P., & Tafur Monroy, I. (2024). Quantum-resistant Transport Layer Security. Computer Communications, 213, 345–358. https://doi.org/10.1016/j.comcom.2023.11.010
Sharma, R. K., & Chelliah, P. R. (2025). Chapter Four—Quantum cryptographic algorithms for secure IoT and blockchain ledgers. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 71–109). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.003
Singh, S. K., Kumar, S., Singh, M., Gupta, S., Attar, R. W., Arya, V., Alhomoud, A., & Gupta, B. B. (2025). Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security. Computers, Materials and Continua, 84(2), 3927–3941. https://doi.org/10.32604/cmc.2025.059643
Song, L., Shi, L., Ren, X., & Li, X. (2026). SoA-SDA: Quantum-Resistant, Energy-Efficient In-Network Aggregation Protocol for Resource-Constrained Environment. Future Generation Computer Systems, 178, 108321. https://doi.org/10.1016/j.future.2025.108321
Sutheekshan, B., Shajahan, B., & Gnanaprakasam, T. (2025). Chapter Nine—Post quantum computing – cryptography. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 221–257). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.008
Trungadi, F., Fabiano, M., Aloisio, D., Brunaccini, G., Sergi, F., Merlino, G., & Longo, F. (2025). Securing Modbus in legacy industrial control systems: A decentralized approach using proxies, Post-Quantum Cryptography and Self-Sovereign Identity. Journal of Information Security and Applications, 94, 104199. https://doi.org/10.1016/j.jisa.2025.104199
V.P., J. V., I.N., S., Thampi, S. M., & Nair, A. S. (2026). A quantum-secure digital signature-based communication protocol for the Internet of Drones (IoD). Journal of Network and Computer Applications, 245, 104398. https://doi.org/10.1016/j.jnca.2025.104398
Wicaksana, A. (2025). A survey on quantum-safe blockchain security infrastructure. Computer Science Review, 57, 100752. https://doi.org/10.1016/j.cosrev.2025.100752
Zeng, C., He, D., Feng, Q., Peng, C., & Luo, M. (2024). The implementation of polynomial multiplication for lattice-based cryptography: A survey. Journal of Information Security and Applications, 83, 103782. https://doi.org/10.1016/j.jisa.2024.103782
Authors
Copyright (c) 2025 Kiran Iqbal, Zainab Ali, Bilal Aslam

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.