ENCRYPTION APOCALYPSE? PREPARING DATA SECURITY FOR THE QUANTUM COMPUTING ERA

Kiran Iqbal (1), Zainab Ali (2), Bilal Aslam (3)
(1) Institute of Business Administration, Karachi, Pakistan,
(2) Pakistan Institute of Engineering and Applied Sciences, Pakistan,
(3) Lahore University of Science and Technology, Pakistan

Abstract

The imminent maturation of quantum computing threatens to nullify the mathematical hardness underpinning global Public Key Infrastructure, creating an urgent “Harvest Now, Decrypt Later” vulnerability. This study investigates the operational feasibility of transitioning to NIST-standardized Post-Quantum Cryptography (PQC) protocols within heterogeneous network environments. Utilizing a rigorous quantitative benchmarking framework, we evaluated the performance of lattice-based primitives, specifically ML-KEM and ML-DSA, against classical standards across high-performance servers and resource-constrained IoT devices. Empirical data reveals a fundamental architectural paradigm shift: while PQC algorithms exhibit superior computational execution speeds, they introduce severe transmission overheads, resulting in memory saturation and packet fragmentation on edge hardware. Results demonstrate that hybrid encryption schemes provide valid risk mitigation but incur statistically significant latency penalties due to expanded artifact sizes. We definitively conclude that the “Encryption Apocalypse” is primarily a bandwidth and memory bottleneck rather than a computational one, mandating the immediate deployment of adaptive crypto-agility frameworks to manage the infrastructural constraints of the post-quantum era.

Full text article

Generated from XML file

References

Abood, E. W., Yassin, A. A., Abduljabbar, Z. A., Nyangaresi, V. O., & Ali, A. H. (2025). Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. MethodsX, 15, 103631. https://doi.org/10.1016/j.mex.2025.103631

Asim, M., Junsheng, W., Weigang, L., Zhijun, L., Peng, Z., Hao, H., Dong, W., & Mohi-ud-Din, G. (2026). Quantum-resistant blockchain architecture for secure vehicular networks: A ML-KEM-enabled approach with PoA and PoP consensus. Future Generation Computer Systems, 180, 108391. https://doi.org/10.1016/j.future.2026.108391

Aslam, A. M., Bhardwaj, A., & Chaudhary, R. (2025). Quantum-resilient blockchain-enabled secure communication framework for connected autonomous vehicles using post-quantum cryptography. Vehicular Communications, 52, 100880. https://doi.org/10.1016/j.vehcom.2025.100880

Astarloa, A., Lázaro, J., & Gárate, J. I. (2025). CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems. Internet of Things, 33, 101656. https://doi.org/10.1016/j.iot.2025.101656

Bandaru, M., Mathe, S. E., & Wattanapanich, C. (2024). Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs. Computers and Electrical Engineering, 120, 109826. https://doi.org/10.1016/j.compeleceng.2024.109826

Castiglione, A., & Elia, T. (2025). Securing in-vehicle communications through post-quantum cryptography and network segmentation. Computers and Electrical Engineering, 126, 110488. https://doi.org/10.1016/j.compeleceng.2025.110488

Chelliah, P. R., & Sharma, R. K. (2025). Chapter One—A technical perspective on post-quantum cryptography (PQC) algorithms for the quantum era. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 1–24). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.004

Chouhan, V., Aldarwbi, M., Sadeghi, S., Ghorbani, A., Chow, A., & Burko, R. (2026). Assessing the quantum readiness of cryptographic standards: Recommendations toward quantum-era compliance. Computer Standards & Interfaces, 97, 104114. https://doi.org/10.1016/j.csi.2025.104114

Cíbik, P., Ricci, S., Dobiáš, P., Hajný, J., Malina, L., & Havlín, J. (2025). Quantum-resistant hardware-accelerated IoT traffic encryptor. Internet of Things, 31, 101554. https://doi.org/10.1016/j.iot.2025.101554

Farooq, S., Altaf, A., Shoaib, M., Iqbal, F., Samee, N. A., Alohali, M. A., & Ashraf, I. (2025). Analyzing post-quantum cryptographic algorithms efficiency for transport security layer. Computers and Electrical Engineering, 125, 110437. https://doi.org/10.1016/j.compeleceng.2025.110437

Hamza, R., Alotaibi, A., & Muhammad, K. (2026). A practical multi-layered framework for post-quantum secure machine learning. Engineering Applications of Artificial Intelligence, 163, 113044. https://doi.org/10.1016/j.engappai.2025.113044

Hanna, Y., Bozhko, J., Tonyali, S., Harrilal-Parchment, R., Cebe, M., & Akkaya, K. (2025). A comprehensive and realistic performance evaluation of post-quantum security for consumer IoT devices. Internet of Things, 33, 101650. https://doi.org/10.1016/j.iot.2025.101650

Hussain, M. S., Arockiasamy, K., & Kanimozhi, G. (2025). Chapter 4—Post quantum cryptography for data safeguarding. In R. Buyya & S. S. Gill (Eds.), Quantum Computing (pp. 69–80). Morgan Kaufmann. https://doi.org/10.1016/B978-0-443-29096-1.00009-X

Khawar, M., Khalid, S., Rehman, M. U., Usman, A., Malwi, W. A., & Asiri, F. (2026). Shaping the future of cybersecurity: The convergence of AI, quantum computing, and ethical frameworks for a secure digital era. Computer Science Review, 60, 100882. https://doi.org/10.1016/j.cosrev.2025.100882

Ktari, J., frikha, T., Hamdi, M., Affes, N., & Hamam, H. (2025). Enhancing Blockchain Security and Efficiency through FPGA-based Consensus Mechanisms and Post-quantum Cryptography. Recent Advances in Electrical and Electronic Engineering, 18(7), 946–958. https://doi.org/10.2174/0123520965288815240424054237

Kundu, S., Gupta, T., Sardar, A., Bandyopadhyay, A., Swain, S., & Mallik, S. (2025). A survey on quantum computing: Transforming cryptography, AI/ML, blockchain, and network communication. Franklin Open, 12, 100371. https://doi.org/10.1016/j.fraope.2025.100371

Ma, C., Shankar, A., Kumari, S., & Chen, C.-M. (2024). A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security. Internet of Things, 28, 101391. https://doi.org/10.1016/j.iot.2024.101391

Montenegro, J. A., Rios, R., & Bonilla, J. (2026). Comparative analysis of post-quantum handshake performance in QUIC and TLS protocols. Computer Networks, 275, 111957. https://doi.org/10.1016/j.comnet.2025.111957

Montenegro, J. A., Rios, R., & Lopez-Cerezo, J. (2026). A performance evaluation framework for post-quantum TLS. Future Generation Computer Systems, 175, 108062. https://doi.org/10.1016/j.future.2025.108062

Moon, S. Y., Jo, B. H., Azzaoui, A. E., Singh, S. K., & Park, J. H. (2025). Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions. Computers, Materials and Continua, 84(1), 25–55. https://doi.org/10.32604/cmc.2025.062966

Peelam, M. S., Chaurasia, B. K., Shukla, M. M., & Chamola, V. (2026). Enhancing quantum-resistant data privacy in vehicular cloud networks using NIST-qualified FALCON algorithm. Vehicular Communications, 58, 100995. https://doi.org/10.1016/j.vehcom.2025.100995

Prajapat, S., Thakur, G., Kumar, P., Das, A. K., Jamal, S. S., & Susilo, W. (2025). Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Computers and Electrical Engineering, 123, 110028. https://doi.org/10.1016/j.compeleceng.2024.110028

Prakash, P. S., Rao, P. K., Gokaramaiah, T., B? Khan, S. B., Alojail, M., & Shabaz, M. (2025). Enhancing computation and security in MEC-Aided IoT for medical imaging with QCNNs and post-Quantum cryptography. Internet of Things, 34, 101810. https://doi.org/10.1016/j.iot.2025.101810

Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000. https://doi.org/10.1016/j.dcan.2022.12.003

Rubio García, C., Rommel, S., Takarabt, S., Vegas Olmos, J. J., Guilley, S., Nguyen, P., & Tafur Monroy, I. (2024). Quantum-resistant Transport Layer Security. Computer Communications, 213, 345–358. https://doi.org/10.1016/j.comcom.2023.11.010

Sharma, R. K., & Chelliah, P. R. (2025). Chapter Four—Quantum cryptographic algorithms for secure IoT and blockchain ledgers. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 71–109). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.003

Singh, S. K., Kumar, S., Singh, M., Gupta, S., Attar, R. W., Arya, V., Alhomoud, A., & Gupta, B. B. (2025). Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security. Computers, Materials and Continua, 84(2), 3927–3941. https://doi.org/10.32604/cmc.2025.059643

Song, L., Shi, L., Ren, X., & Li, X. (2026). SoA-SDA: Quantum-Resistant, Energy-Efficient In-Network Aggregation Protocol for Resource-Constrained Environment. Future Generation Computer Systems, 178, 108321. https://doi.org/10.1016/j.future.2025.108321

Sutheekshan, B., Shajahan, B., & Gnanaprakasam, T. (2025). Chapter Nine—Post quantum computing – cryptography. In P. Raj, K. Saini, & B. B. Gupta (Eds.), Advances in Computers (Vol. 138, pp. 221–257). Elsevier. https://doi.org/10.1016/bs.adcom.2025.03.008

Trungadi, F., Fabiano, M., Aloisio, D., Brunaccini, G., Sergi, F., Merlino, G., & Longo, F. (2025). Securing Modbus in legacy industrial control systems: A decentralized approach using proxies, Post-Quantum Cryptography and Self-Sovereign Identity. Journal of Information Security and Applications, 94, 104199. https://doi.org/10.1016/j.jisa.2025.104199

V.P., J. V., I.N., S., Thampi, S. M., & Nair, A. S. (2026). A quantum-secure digital signature-based communication protocol for the Internet of Drones (IoD). Journal of Network and Computer Applications, 245, 104398. https://doi.org/10.1016/j.jnca.2025.104398

Wicaksana, A. (2025). A survey on quantum-safe blockchain security infrastructure. Computer Science Review, 57, 100752. https://doi.org/10.1016/j.cosrev.2025.100752

Zeng, C., He, D., Feng, Q., Peng, C., & Luo, M. (2024). The implementation of polynomial multiplication for lattice-based cryptography: A survey. Journal of Information Security and Applications, 83, 103782. https://doi.org/10.1016/j.jisa.2024.103782

Authors

Kiran Iqbal
kiraniqballl@gmail.com (Primary Contact)
Zainab Ali
Bilal Aslam
Iqbal, K., Ali, Z. ., & Aslam, B. . (2025). ENCRYPTION APOCALYPSE? PREPARING DATA SECURITY FOR THE QUANTUM COMPUTING ERA. Journal of Computer Science Advancements, 3(4), 205–219. https://doi.org/10.70177/jsca.v3i4.3338

Article Details

Most read articles by the same author(s)