Enhancing Data Security and Integrity with Post-Quantum and AES Digital Signatures

Authors

  • Rayasa Puringgar Prasadha Putra Cyber Defense Engineering, Faculty of Defense Science and Technology, Universitas Pertahanan
  • H. A. Danang Rimbawa Cyber Defense Engineering, Faculty of Defense Science and Technology, Universitas Pertahanan
  • Bisyron Wahyudi Cyber Defense Engineering, Faculty of Defense Science and Technology, Universitas Pertahanan

DOI:

https://doi.org/10.53697/jkomitek.v4i2.2081

Keywords:

Algoritma Data Encryption Standard, Security, Post – Quantum Cryptography, Digital Signature, Data Integrity

Abstract

Data security and integrity are crucial issues in contemporary information systems, since the emergence of quantum computing presents substantial risks to traditional cryptographic techniques such as RSA and ECC. This work suggests a hybrid technique that combines the Advanced Encryption Standard (AES) for symmetric encryption with Post-Quantum Cryptography (PQC) digital signatures to mitigate these issues. The framework seeks to safeguard sensitive documents, including PDFs, against unauthorized alterations and Man-in-the-Middle (MiTM) attacks. A simulation is executed to illustrate the threats associated with Man-in-the-Middle (MiTM) attacks, whereby the encrypted document and digital signatures are intercepted, altered, and re-encrypted. The technology guarantees data integrity by signature verification and hash comparisons, efficiently identifying and preventing tampering. The findings indicate that the suggested PQC-AES hybrid system not only fortifies defenses against conventional threats but also improves resistance to quantum-based assaults, offering a scalable and safe approach for contemporary data security. The research emphasizes the need of implementing quantum-resistant algorithms to safeguard digital security systems for the future, while preserving the efficacy of existing encryption techniques. The progression of quantum computing presents substantial threats to traditional cryptography methods, including RSA and ECC. These cryptosystems depend on mathematical issues that can be effectively resolved using quantum algorithms, especially Shor's algorithm. Post-Quantum Cryptography (PQC) has emerged as a viable way to mitigate this issue

References

Aggarwal, D., Brennen, G., Lee, T., Santha, M., & Tomamichel, M. (2018). Quantum Attacks on Bitcoin, and How to Protect Against Them. Ledger, 3. https://doi.org/10.5195/ledger.2018.127

Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2022). Status report on the third round of the NIST Post-Quantum Cryptography Standardization process. https://doi.org/10.6028/NIST.IR.8413-upd1

Bernstein, D., & Lange, T. (2017). Post-quantum cryptography. Nature, 549, 188–194. https://doi.org/10.1038/nature23461

Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography. NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD. https://doi.org/https://doi.org/10.6028/NIST.IR.8105

Khan, S., Palani, K., Goswami, M., Rakhimjonovna, F., Mohammed, S., & Menaga, D. (2024). Quantum Computing And Its Implications For Cyber security: A Comprehensive Review Of Emerging Threats And Defenses. Nanotechnology Perceptions, 20, 1232–1248. https://doi.org/10.62441/nano-ntp.v20iS13.79

Liu, R., Rozenman, G. G., Kundu, N. K., Chandra, D., & De, D. (2022). Towards the industrialisation of quantum key distribution in communication networks: A short survey. IET Quantum Communication, 3(3), 151–163. https://doi.org/10.1049/qtc2.12044

Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M., Aguado, A., Martin, V., Schauer, S., Poppe, A., Pacher, C., & Voznak, M. (2020). Quantum Key Distribution: A Networking Perspective. ACM Computing Surveys, 53(5). https://doi.org/10.1145/3402192

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Applied Cryptography.

Olivia Putri Irine Irawan, B., Tahir, M., Ayu Windrastuti, N., Yurina Cholili, D., Mulaikah, D., Batsul Mushofi Septian wachid, A., & Pendidikan Informatika, P. (2023). Implementasi Kriptografi Pada Keamanan Data Menggunakan Algoritma Advance Encryption Standard (AES) Cryptographic Implementation In Data Security Using Advanced Encryption Standard (AES) Algorithm. 11(2).

Peikert, C. (2016). A Decade of Lattice Cryptography. Foundations and Trends® in Theoretical Computer Science, 10, 283–424. https://doi.org/10.1561/0400000074

Preskill, J. (2018). Quantum Computing in the NISQ era and beyond. Quantum, 2, 79. https://doi.org/10.22331/q-2018-08-06-79

Shim, K.-A. (2022). A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042. https://doi.org/10.1109/TITS.2021.3131668

Stallings, William. (2017). Cryptography and network security : principles and practice. Pearson Education Limited.

Downloads

Published

2024-12-23

How to Cite

Puringgar Prasadha Putra, R., H. A. Danang Rimbawa, & Bisyron Wahyudi. (2024). Enhancing Data Security and Integrity with Post-Quantum and AES Digital Signatures. Jurnal Komputer, Informasi Dan Teknologi, 4(2). https://doi.org/10.53697/jkomitek.v4i2.2081

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.