ARCHIVES
Original Article
Quantum Shield: Design, Implementation, and Empirical Evaluation of a Hybrid Post-Quantum Secure Peer-to-Peer Communication System Using ML-KEM and ML-DSA
Sridhar S1
Balraj S2
Anbarasu J3
Sanjay M4
J. Dhivya5
1 2 3 4 Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India. 5 Assistant Professor, Department of CSE, United Institute of Technology, Coimbatore, Tamil Nadu, India.
Published Online: May-August 2026
Pages: 229-236
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502025References
[1] P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal
on Computing, vol. 26, no. 5, pp. 1484–1509, Oct. 1997, doi: 10.1137/S0097539795293172.
[2] C. Gidney and M. Eker, "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits," Quantum, vol. 5, p. 433, Apr.
2021, doi: 10.22331/q-2021-04-15-433.
[3] IBM Corporation, "IBM Quantum Development Roadmap," IBM Research, 2023. [Online]. Available:
https://www.ibm.com/quantum/roadmap
[4] M. Mosca and M. Piani, "2022 Quantum Threat Timeline Report," Global Risk Institute, 2022. [Online]. Available:
https://globalriskinstitute.org
[5] National Institute of Standards and Technology, "Module-Lattice-Based Key-Encapsulation Mechanism Standard," FIPS PUB 203, Aug.
2024, doi: 10.6028/NIST.FIPS.203.
[6] National Institute of Standards and Technology, "Module-Lattice-Based Digital Signature Standard," FIPS PUB 204, Aug. 2024,
doi: 10.6028/NIST.FIPS.204.
[7] D. J. Bernstein and T. Lange, "Post-quantum cryptography," Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017, doi: 10.1038/nature23461.
[8] J. Bos et al., "CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM," in Proc. IEEE European Symposium on Security and
Privacy (EuroS&P;), London, UK, 2018, pp. 353–367, doi: 10.1109/EuroSP.2018.00032.
[9] L. Ducas et al., "CRYSTALS-Dilithium: A lattice-based digital signature scheme," IACR Trans. Cryptographic Hardware and
Embedded Systems, vol. 2018, no. 1, pp. 238–268, 2018, doi: 10.13154/tches.v2018.i1.238-268.
[10] C. Paquin, D. Stebila, and G. Tamvada, "Benchmarking post-quantum cryptography in TLS," in Proc. Financial Cryptography and
Data Security, 2020, pp. 72–91, doi: 10.1007/978-3-030-54455-3_4.
[11] M. Campagna et al., "Quantum safe cryptography and security: An introduction, benefits, enablers and challenges," ETSI White Paper
No. 8, 2015.
[12] D. Stebila, S. Fluhrer, and S. Gueron, "Hybrid key exchange in TLS 1.3," Internet Draft draft-ietf-tls-hybrid-design-10, IETF, 2023.
[13] D. O'Brien, "Protecting Chrome Traffic with Hybrid Kyber KEM," Google Security Blog, Aug. 2023. [Online]. Available:
https://security.googleblog.com/2023/08/protecting-chrome-traffic-with-hybrid.html
[14] Apple Inc., "iMessage with PQ3: The new state of the art in quantum-secure messaging at scale," Apple Security Research, Feb.
2024. [Online]. Available: https://security.apple.com/blog/imessage-pq3/
[15] Signal, "PQXDH: Post-Quantum Extended Diffie-Hellman," Signal Blog, Sep. 2023. [Online]. Available:
https://signal.org/docs/specifications/pqxdh/
[16] L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. 28th ACM Symposium on Theory of Computing
(STOC), Philadelphia, PA, 1996, pp. 212–219.
[17] V. Lyubashevsky, C. Peikert, and O. Regev, "On ideal lattices and learning with errors over rings," J. ACM, vol. 60, no. 6, pp. 1–35, Nov.
2013, doi: 10.1145/2535925.
[18] National Institute of Standards and Technology, "Recommendations for Stateful Hash-Based Signature Schemes," NIST SP 800-208, Oct.
2020, doi: 10.6028/NIST.SP.800-208.
[19] R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext
attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167–226, 2004.
[20] D. Dolev and A. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208,
Mar. 1983, doi: 10.1109/TIT.1983.1056650.
on Computing, vol. 26, no. 5, pp. 1484–1509, Oct. 1997, doi: 10.1137/S0097539795293172.
[2] C. Gidney and M. Eker, "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits," Quantum, vol. 5, p. 433, Apr.
2021, doi: 10.22331/q-2021-04-15-433.
[3] IBM Corporation, "IBM Quantum Development Roadmap," IBM Research, 2023. [Online]. Available:
https://www.ibm.com/quantum/roadmap
[4] M. Mosca and M. Piani, "2022 Quantum Threat Timeline Report," Global Risk Institute, 2022. [Online]. Available:
https://globalriskinstitute.org
[5] National Institute of Standards and Technology, "Module-Lattice-Based Key-Encapsulation Mechanism Standard," FIPS PUB 203, Aug.
2024, doi: 10.6028/NIST.FIPS.203.
[6] National Institute of Standards and Technology, "Module-Lattice-Based Digital Signature Standard," FIPS PUB 204, Aug. 2024,
doi: 10.6028/NIST.FIPS.204.
[7] D. J. Bernstein and T. Lange, "Post-quantum cryptography," Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017, doi: 10.1038/nature23461.
[8] J. Bos et al., "CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM," in Proc. IEEE European Symposium on Security and
Privacy (EuroS&P;), London, UK, 2018, pp. 353–367, doi: 10.1109/EuroSP.2018.00032.
[9] L. Ducas et al., "CRYSTALS-Dilithium: A lattice-based digital signature scheme," IACR Trans. Cryptographic Hardware and
Embedded Systems, vol. 2018, no. 1, pp. 238–268, 2018, doi: 10.13154/tches.v2018.i1.238-268.
[10] C. Paquin, D. Stebila, and G. Tamvada, "Benchmarking post-quantum cryptography in TLS," in Proc. Financial Cryptography and
Data Security, 2020, pp. 72–91, doi: 10.1007/978-3-030-54455-3_4.
[11] M. Campagna et al., "Quantum safe cryptography and security: An introduction, benefits, enablers and challenges," ETSI White Paper
No. 8, 2015.
[12] D. Stebila, S. Fluhrer, and S. Gueron, "Hybrid key exchange in TLS 1.3," Internet Draft draft-ietf-tls-hybrid-design-10, IETF, 2023.
[13] D. O'Brien, "Protecting Chrome Traffic with Hybrid Kyber KEM," Google Security Blog, Aug. 2023. [Online]. Available:
https://security.googleblog.com/2023/08/protecting-chrome-traffic-with-hybrid.html
[14] Apple Inc., "iMessage with PQ3: The new state of the art in quantum-secure messaging at scale," Apple Security Research, Feb.
2024. [Online]. Available: https://security.apple.com/blog/imessage-pq3/
[15] Signal, "PQXDH: Post-Quantum Extended Diffie-Hellman," Signal Blog, Sep. 2023. [Online]. Available:
https://signal.org/docs/specifications/pqxdh/
[16] L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. 28th ACM Symposium on Theory of Computing
(STOC), Philadelphia, PA, 1996, pp. 212–219.
[17] V. Lyubashevsky, C. Peikert, and O. Regev, "On ideal lattices and learning with errors over rings," J. ACM, vol. 60, no. 6, pp. 1–35, Nov.
2013, doi: 10.1145/2535925.
[18] National Institute of Standards and Technology, "Recommendations for Stateful Hash-Based Signature Schemes," NIST SP 800-208, Oct.
2020, doi: 10.6028/NIST.SP.800-208.
[19] R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext
attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167–226, 2004.
[20] D. Dolev and A. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208,
Mar. 1983, doi: 10.1109/TIT.1983.1056650.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026