Quantum-Resistant Cryptography Protocols for Next-Generation Secure Network Communications

Uju Judith Eziokwu1, Olatunde Ayomide Olasehan2, Omowunmi Folashayo Makinde3, & Adetunji Oludele Adebayo4
1Data Analyst/Independent Researcher, University of Bradford
2IT Engineer/Independent Researcher, Swansea University, UK
3IT Support Engineer I/Independent Researcher, University of the Cumberlands, USA
4Information Security Professional/Independent Researcher, University of Bradford, UK
DOI – http://doi.org/10.37502/IJSMR.2025.81206

Abstract

The advent of scalable quantum computing poses existential threats to the cryptographic foundations of secure network communications. This paper presents a comprehensive examination of quantum-resistant (also called post-quantum) cryptographic protocols, their underlying mathematical foundations, the migration challenges for classical networks, and roadmap strategies for next-generation secure communications infrastructure. After framing the threat landscape, we survey major candidate algorithm classes, review standardization activities by National Institute of Standards and Technology (NIST) and other bodies, discuss practical deployment issues in network communications, and propose guidelines for adopting quantum-resistant cryptography in enterprise and infrastructure contexts. The findings emphasize that although full quantum computers capable of breaking current public-key systems may still be some years away, the window for “harvest now, decrypt later” attacks compels early migration planning.

Keywords: Cryptography, Quantum computing, Network Communications

References

  • Alvarado, M., Gayler, L., Seals, A., Wang, T., & Hou, T. (2023). A survey on post-quantum cryptography: State-of-the-art and challenges. https://arxiv.org/abs/2312.10430
  • Alkim, E., Ducas, L., Pöppelmann, T., & Schwabe, P. (2016). Post-quantum key exchange – A new hope. In 25th USENIX Security Symposium (pp. 327–343). USENIX Association. https://www.usenix.org/conference/usenixsecurity16
  • Banerjee, U., Ukyab, T. S., & Chandrakasan, A. P. (2019). Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. https://arxiv.org/abs/1910.07557
  • Bos, J. W., Fried, J., Kwiatkowski, K., & Campagna, M. (2018). Hybrid key exchange in TLS 1.3. Internet Engineering Task Force (IETF) Internet-Draft. https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design
  • Castryck, W., & Decru, T. (2022). An efficient key recovery attack on SIDH (Preliminary version). Cryptology ePrint Archive. https://eprint.iacr.org/2022/975
  • European Telecommunications Standards Institute. (2023). Quantum-safe cryptography: Implementation guidance and standardization roadmap. ETSI ISG-QSC Report. https://www.etsi.org
  • European Union Agency for Cybersecurity. (2024). Quantum-safe cryptography: Preparing for the transition. ENISA Publications. https://www.enisa.europa.eu
  • Herlédan Le Merdy, A., & Wesolowski, B. (2025). Reductions for the supersingular isogeny problems. Cryptology ePrint Archive. https://eprint.iacr.org/2025/154
  • Kwiatkowski, J., Bos, J., Fried, J., & Campagna, M. (2022). Hybrid post-quantum TLS experiments. Cloudflare Research. https://blog.cloudflare.com/post-quantum-tls/
  • National Institute of Standards and Technology. (2022, July 5). NIST announces first four quantum-resistant cryptographic algorithms. https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms
  • National Institute of Standards and Technology. (2024). Post-Quantum Cryptography Standardization: Round 4 status update. https://csrc.nist.gov/projects/post-quantum-cryptography
  • National Security Agency. (n.d.). Commercial National Security Algorithm Suite 2.0 and quantum readiness guidance. https://www.nsa.gov/Cybersecurity/Post-Quantum-Cybersecurity-Resources/
  • Quantum-Resistant Cryptography. (2021). Post-quantum cryptography: Protecting communications in the quantum era.S. Department of Commerce, NIST Cybersecurity White Paper. https://nvlpubs.nist.gov/nistpubs/ir/2021
  • Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56(6), 1–40. https://doi.org/10.1145/1568318.1568324
  • Sowa, J., Hoang, B., Yeluru, A., Qie, S., Nikolich, A., Iyer, R., & Cao, P. (2024). Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC adoption rates and identifying migration pathways. https://arxiv.org/abs/2408.00054
  • Stratil, M., & Hasegawa, Y. (2020). Post-quantum cryptography and supersingular isogenies: Current progress and open challenges. IEEE Access, 8, 193028–193045. https://doi.org/10.1109/ACCESS.2020.3031214
  • Tambe-Jagtap, S. N. (2023). A survey of cryptographic algorithms in cybersecurity: From classical methods to quantum-resistant solutions. Shifra Journal, 2023(1), 1–15. https://doi.org/10.70470/SHIFRA/2023/006
  • Wikipedia contributors. (n.d.-a). In Wikipedia. Retrieved October 25, 2025, from https://en.wikipedia.org/wiki/CECPQ2
  • Wikipedia contributors. (n.d.-b). Supersingular isogeny key exchange. In Retrieved October 25, 2025, from https://en.wikipedia.org/wiki/Supersingular_isogeny_key_exchange