Security Analysis of Classical and Post-Quantum Blockchains

被引:0
|
作者
Dahhak, Hajar [1 ]
Afifi, Nadia [1 ]
Hilal, Imane [2 ]
机构
[1] CED ENSEM Hassan2, C3S Lab EST, Lamhamid 5 NR 175, Casablanca, Morocco
[2] Itqan Team ESI, Rabat, Morocco
关键词
Blockchain; post-quantum cryptography; ECDSA; falcon algorithm; DDoS attacks; replay attacks; Sybil attacks; performance evaluation; quantum computing; cybersecurity;
D O I
10.1080/08874417.2024.2433263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the emergence of quantum computing has created substantial problems to the security of cryptographic methods often utilized in blockchain technology. As quantum computers become more powerful, the possibility of them breaking classical cryptography algorithms such as ECDSA grows, forcing researchers to look for quantum-resistant alternatives. Post-quantum cryptographic algorithms, such as Falcon, have emerged as possible alternatives for long-term blockchain security. This study examines the performance and security of classical (ECDSA) and post-quantum (Falcon) blockchains under a variety of attack scenarios, including DDoS, replay, and Sybil attacks. Our research will evaluate the computational and resource needs of several cryptographic approaches, as well as examine how these infrastructures respond under various attack situations and emphasize the trade-offs between higher security and resource consumption. Our results show that, while post-quantum blockchains are more resistant to quantum computing threats, they need much more CPU and memory than their classical equivalents. This increased resource requirement affects scalability and efficiency, especially in high-load scenarios. Despite their resistance to quantum attacks, post-quantum blockchains are still vulnerable to traditional attack vectors, as demonstrated by the significant computing cost seen throughout our testing. These research results underscore the need of balanced blockchain systems that successfully handle the trade-offs between security and performance.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] : A Crystal for Post-Quantum Security Using Kyber and Dilithium
    Aikata, Aikata
    Mert, Ahmet Can
    Imran, Malik
    Pagliarini, Samuel
    Roy, Sujoy Sinha
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (02) : 747 - 758
  • [42] Post-Quantum Security of the Even-Mansour Cipher
    Alagic, Gorjan
    Bai, Chen
    Katz, Jonathan
    Majenz, Christian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 458 - 487
  • [43] Post-Quantum Security of IGE Mode Encryption in Telegram
    Lee, Jeeun
    Kim, Sungsook
    Lee, Seunghyun
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 148 - 151
  • [44] Computational Refinements for Post-Quantum Elliptic Curve Security
    Sakk, Eric
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 32 - 35
  • [45] Performance Analysis of Post-Quantum Algorithms
    Lauterbach, Filip
    Burdiak, Patrik
    Richter, Filip
    Voznak, Miroslav
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [46] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [47] Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
    Canteaut, Anne
    Duval, Sebastien
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Perrin, Leo
    Pornin, Thomas
    Schrottenloher, Andre
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 160 - 207
  • [48] A survey on post-quantum based approaches for edge computing security
    Karakaya, Aykut
    Ulu, Ahmet
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2024, 16 (01)
  • [49] Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
    Targhi, Ehsan Ebrahimi
    Unruh, Dominique
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 192 - 216
  • [50] TUTORIAL: Post-Quantum Cryptography and 5G Security
    Clancy, T. Charles
    McGwier, Robert W.
    Chen, Lidong
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 285 - +