Security Analysis of Classical and Post-Quantum Blockchains

被引:0
|
作者
Dahhak, Hajar [1 ]
Afifi, Nadia [1 ]
Hilal, Imane [2 ]
机构
[1] CED ENSEM Hassan2, C3S Lab EST, Lamhamid 5 NR 175, Casablanca, Morocco
[2] Itqan Team ESI, Rabat, Morocco
关键词
Blockchain; post-quantum cryptography; ECDSA; falcon algorithm; DDoS attacks; replay attacks; Sybil attacks; performance evaluation; quantum computing; cybersecurity;
D O I
10.1080/08874417.2024.2433263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the emergence of quantum computing has created substantial problems to the security of cryptographic methods often utilized in blockchain technology. As quantum computers become more powerful, the possibility of them breaking classical cryptography algorithms such as ECDSA grows, forcing researchers to look for quantum-resistant alternatives. Post-quantum cryptographic algorithms, such as Falcon, have emerged as possible alternatives for long-term blockchain security. This study examines the performance and security of classical (ECDSA) and post-quantum (Falcon) blockchains under a variety of attack scenarios, including DDoS, replay, and Sybil attacks. Our research will evaluate the computational and resource needs of several cryptographic approaches, as well as examine how these infrastructures respond under various attack situations and emphasize the trade-offs between higher security and resource consumption. Our results show that, while post-quantum blockchains are more resistant to quantum computing threats, they need much more CPU and memory than their classical equivalents. This increased resource requirement affects scalability and efficiency, especially in high-load scenarios. Despite their resistance to quantum attacks, post-quantum blockchains are still vulnerable to traditional attack vectors, as demonstrated by the significant computing cost seen throughout our testing. These research results underscore the need of balanced blockchain systems that successfully handle the trade-offs between security and performance.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A Survey and Comparison of Post-Quantum and Quantum Blockchains
    Yang, Zebo
    Alfauri, Haneen
    Farkiani, Behrooz
    Jain, Raj
    Di Pietro, Roberto
    Erbad, Aiman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 967 - 1002
  • [2] Transitioning RingCT Accounts: From Classical to Post-Quantum Security
    Duan, Junke
    Wang, Wei
    Wang, Licheng
    Gu, Lize
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 2090 - 2105
  • [3] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [4] Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms
    Leevik, Anton
    Beliaev, Vladislav
    Stasenko, Boris
    Davydov, Vadim
    Bezzateev, Sergey
    2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 105 - 112
  • [5] Post-Quantum Primitives in Information Security
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Iarmak, A. V.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 269 - 276
  • [6] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [7] Post-Quantum Security: Opportunities and Challenges
    Li, Silong
    Chen, Yuxiang
    Chen, Lin
    Liao, Jing
    Kuang, Chanchan
    Li, Kuanching
    Liang, Wei
    Xiong, Naixue
    SENSORS, 2023, 23 (21)
  • [8] A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
    Hasan, Khondokar Fida
    Simpson, Leonie
    Baee, Mir Ali Rezazadeh
    Islam, Chadni
    Rahman, Ziaur
    Armstrong, Warren
    Gauravaram, Praveen
    McKague, Matthew
    IEEE ACCESS, 2024, 12 : 23427 - 23450
  • [9] Lattice-Based Proof-of-Work for Post-Quantum Blockchains
    Behnia, Rouzbeh
    Postlethwaite, Eamonn W.
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 310 - 318
  • [10] Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
    Ghashghaei, Farshad Rahimi
    Ahmed, Yussuf
    Elmrabit, Nebrase
    Yousefi, Mehdi
    COMPUTERS, 2024, 13 (07)