Autors: Ivanov, K. I., Nenova, M. V., Tsochev, G. R.
Title: Hybrid Cryptography: A Framework for Post-Quantum Agility and Resilience
Keywords: cryptographic agility, hybrid cryptography, hybrid key derivation functions, post quantum cryptography, public key infrastructure, quantum key distribution

Abstract: Quantum computing threatens classical cryptography, which has prompted the creation of post-quantum cryptography (PQC) and quantum key distribution (QKD). Hybrid cryptography integrates classical, post-quantum, and quantum techniques for achieving multi-layer security and smooth migration towards quantum-safe infrastructures. In this paper, practical deployment patterns, the employment of cryptographic agility, and integration of PQC with QKD are presented with emphasis on hybrid methods as a key strategy for quantum-secure communication.

References

  1. O. Regev, On lattices, learning with errors, random linear codes, and cryptography. STOC, 2005
  2. R. McEliece, A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 1978.
  3. D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen, L. Papachristodoulou, M. Schneider, P. Schwabe, Z. Wilcox-O'Hearn. SPHINCS: practical stateless hash-based signatures, EuroCrypt 2015.
  4. J. Patarin, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. EUROCRYPT 1996.
  5. NIST. Post-Quantum Cryptography Standardization: Round 3 Finalists. National Institute of Standards and Technology., 2022
  6. J. W. Bos, C. Costello, M. Naehrig, D. Stebila. Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. 2015 IEEE Symposium on Security and Privacy, 2018.
  7. S. Pirandola, Advances in quantum cryptography. Advances in Optics and Photonics, 2020.
  8. R. Rios, J. A. Montenegro, A. Múnoz, D. Ferraris. Towards the Quantum-Safe Web: Benchmarking Post-Quantum TLS, 2024.
  9. M. Campagna, A. Petcher, Security of Hybrid Key Encapsulation, 2020.
  10. C. Tjhai, M. Tomlinson, G. Bartlett, S. Fluhrer, D. Van Geest, O. Garcia-Morchon, V. Smyslov. Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2), RFC 9370, 2023.
  11. D. J. Bernstein, K. Bhargavan, S. Bhasin, A. Chattopadhyay, T. K. Chia, M. J. Kannwischer, F. Kiefer, T. B. Paiva, P. Ravi, G. Tamvada. KyberSlash: Exploiting secret-dependent division timings in Kyber implementations, 2024.
  12. NIST, Module-Lattice-Based Key-Encapsulation Mechanism Standard, 2024.
  13. NIST, Module-Lattice-Based Digital Signature Standard, 2024.
  14. NIST, Stateless Hash-Based Digital Signature Standard, 2024.
  15. J. Iyengar, M. Thomson, RFC 9000, QUIC: A UDP-Based Multiplexed and Secure Transport, 2022.
  16. H. Krawczyk, Cryptographic Extraction and Key Derivation: The HKDF Scheme, 2010.

Issue

International Symposium on Wireless Personal Multimedia Communications, WPMC, 2026, Albania, https://doi.org/10.1109/WPMC67460.2025.11351237

Вид: публикация в международен форум, публикация в издание с импакт фактор, публикация в реферирано издание, индексирана в Scopus и Web of Science