Security Analysis of Classical and Post-Quantum Blockchains

被引:0
|
作者
Dahhak, Hajar [1 ]
Afifi, Nadia [1 ]
Hilal, Imane [2 ]
机构
[1] CED ENSEM Hassan2, C3S Lab EST, Lamhamid 5 NR 175, Casablanca, Morocco
[2] Itqan Team ESI, Rabat, Morocco
关键词
Blockchain; post-quantum cryptography; ECDSA; falcon algorithm; DDoS attacks; replay attacks; Sybil attacks; performance evaluation; quantum computing; cybersecurity;
D O I
10.1080/08874417.2024.2433263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the emergence of quantum computing has created substantial problems to the security of cryptographic methods often utilized in blockchain technology. As quantum computers become more powerful, the possibility of them breaking classical cryptography algorithms such as ECDSA grows, forcing researchers to look for quantum-resistant alternatives. Post-quantum cryptographic algorithms, such as Falcon, have emerged as possible alternatives for long-term blockchain security. This study examines the performance and security of classical (ECDSA) and post-quantum (Falcon) blockchains under a variety of attack scenarios, including DDoS, replay, and Sybil attacks. Our research will evaluate the computational and resource needs of several cryptographic approaches, as well as examine how these infrastructures respond under various attack situations and emphasize the trade-offs between higher security and resource consumption. Our results show that, while post-quantum blockchains are more resistant to quantum computing threats, they need much more CPU and memory than their classical equivalents. This increased resource requirement affects scalability and efficiency, especially in high-load scenarios. Despite their resistance to quantum attacks, post-quantum blockchains are still vulnerable to traditional attack vectors, as demonstrated by the significant computing cost seen throughout our testing. These research results underscore the need of balanced blockchain systems that successfully handle the trade-offs between security and performance.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A Survey and Comparison of Post-Quantum and Quantum Blockchains
    Yang, Zebo
    Alfauri, Haneen
    Farkiani, Behrooz
    Jain, Raj
    Di Pietro, Roberto
    Erbad, Aiman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 967 - 1002
  • [2] The Superlinearity Problem in Post-quantum Blockchains
    Park, Sunoo
    Spooner, Nicholas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2023, PT I, 2024, 13950 : 200 - 217
  • [3] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [4] Transitioning RingCT Accounts: From Classical to Post-Quantum Security
    Duan, Junke
    Wang, Wei
    Wang, Licheng
    Gu, Lize
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 2090 - 2105
  • [5] The constraints of post-quantum classical gravity
    Jonathan Oppenheim
    Zachary Weller-Davies
    Journal of High Energy Physics, 2022
  • [6] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [7] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [8] The constraints of post-quantum classical gravity
    Oppenheim, Jonathan
    Weller-Davies, Zachary
    JOURNAL OF HIGH ENERGY PHYSICS, 2022, 2022 (02)
  • [9] Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
    Kraemer, Juliane
    Struck, Patrick
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 539 - 558
  • [10] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,