Enhancing Data Security and Integrity with Post-Quantum and AES Digital Signatures
DOI:
https://doi.org/10.53697/jkomitek.v4i2.2081Keywords:
Algoritma Data Encryption Standard, Security, Post – Quantum Cryptography, Digital Signature, Data IntegrityAbstract
Data security and integrity are crucial issues in contemporary information systems, since the emergence of quantum computing presents substantial risks to traditional cryptographic techniques such as RSA and ECC. This work suggests a hybrid technique that combines the Advanced Encryption Standard (AES) for symmetric encryption with Post-Quantum Cryptography (PQC) digital signatures to mitigate these issues. The framework seeks to safeguard sensitive documents, including PDFs, against unauthorized alterations and Man-in-the-Middle (MiTM) attacks. A simulation is executed to illustrate the threats associated with Man-in-the-Middle (MiTM) attacks, whereby the encrypted document and digital signatures are intercepted, altered, and re-encrypted. The technology guarantees data integrity by signature verification and hash comparisons, efficiently identifying and preventing tampering. The findings indicate that the suggested PQC-AES hybrid system not only fortifies defenses against conventional threats but also improves resistance to quantum-based assaults, offering a scalable and safe approach for contemporary data security. The research emphasizes the need of implementing quantum-resistant algorithms to safeguard digital security systems for the future, while preserving the efficacy of existing encryption techniques. The progression of quantum computing presents substantial threats to traditional cryptography methods, including RSA and ECC. These cryptosystems depend on mathematical issues that can be effectively resolved using quantum algorithms, especially Shor's algorithm. Post-Quantum Cryptography (PQC) has emerged as a viable way to mitigate this issue
References
Aggarwal, D., Brennen, G., Lee, T., Santha, M., & Tomamichel, M. (2018). Quantum Attacks on Bitcoin, and How to Protect Against Them. Ledger, 3. https://doi.org/10.5195/ledger.2018.127
Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2022). Status report on the third round of the NIST Post-Quantum Cryptography Standardization process. https://doi.org/10.6028/NIST.IR.8413-upd1
Bernstein, D., & Lange, T. (2017). Post-quantum cryptography. Nature, 549, 188–194. https://doi.org/10.1038/nature23461
Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography. NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD. https://doi.org/https://doi.org/10.6028/NIST.IR.8105
Khan, S., Palani, K., Goswami, M., Rakhimjonovna, F., Mohammed, S., & Menaga, D. (2024). Quantum Computing And Its Implications For Cyber security: A Comprehensive Review Of Emerging Threats And Defenses. Nanotechnology Perceptions, 20, 1232–1248. https://doi.org/10.62441/nano-ntp.v20iS13.79
Liu, R., Rozenman, G. G., Kundu, N. K., Chandra, D., & De, D. (2022). Towards the industrialisation of quantum key distribution in communication networks: A short survey. IET Quantum Communication, 3(3), 151–163. https://doi.org/10.1049/qtc2.12044
Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M., Aguado, A., Martin, V., Schauer, S., Poppe, A., Pacher, C., & Voznak, M. (2020). Quantum Key Distribution: A Networking Perspective. ACM Computing Surveys, 53(5). https://doi.org/10.1145/3402192
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Applied Cryptography.
Olivia Putri Irine Irawan, B., Tahir, M., Ayu Windrastuti, N., Yurina Cholili, D., Mulaikah, D., Batsul Mushofi Septian wachid, A., & Pendidikan Informatika, P. (2023). Implementasi Kriptografi Pada Keamanan Data Menggunakan Algoritma Advance Encryption Standard (AES) Cryptographic Implementation In Data Security Using Advanced Encryption Standard (AES) Algorithm. 11(2).
Peikert, C. (2016). A Decade of Lattice Cryptography. Foundations and Trends® in Theoretical Computer Science, 10, 283–424. https://doi.org/10.1561/0400000074
Preskill, J. (2018). Quantum Computing in the NISQ era and beyond. Quantum, 2, 79. https://doi.org/10.22331/q-2018-08-06-79
Shim, K.-A. (2022). A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042. https://doi.org/10.1109/TITS.2021.3131668
Stallings, William. (2017). Cryptography and network security : principles and practice. Pearson Education Limited.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Rayasa Puringgar Prasadha Putra, H. A. Danang Rimbawa, Bisyron Wahyudi
This work is licensed under a Creative Commons Attribution 4.0 International License.