Security Analysis of Classical and Post-Quantum Blockchains

被引:0
|
作者
Dahhak, Hajar [1 ]
Afifi, Nadia [1 ]
Hilal, Imane [2 ]
机构
[1] CED ENSEM Hassan2, C3S Lab EST, Lamhamid 5 NR 175, Casablanca, Morocco
[2] Itqan Team ESI, Rabat, Morocco
关键词
Blockchain; post-quantum cryptography; ECDSA; falcon algorithm; DDoS attacks; replay attacks; Sybil attacks; performance evaluation; quantum computing; cybersecurity;
D O I
10.1080/08874417.2024.2433263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the emergence of quantum computing has created substantial problems to the security of cryptographic methods often utilized in blockchain technology. As quantum computers become more powerful, the possibility of them breaking classical cryptography algorithms such as ECDSA grows, forcing researchers to look for quantum-resistant alternatives. Post-quantum cryptographic algorithms, such as Falcon, have emerged as possible alternatives for long-term blockchain security. This study examines the performance and security of classical (ECDSA) and post-quantum (Falcon) blockchains under a variety of attack scenarios, including DDoS, replay, and Sybil attacks. Our research will evaluate the computational and resource needs of several cryptographic approaches, as well as examine how these infrastructures respond under various attack situations and emphasize the trade-offs between higher security and resource consumption. Our results show that, while post-quantum blockchains are more resistant to quantum computing threats, they need much more CPU and memory than their classical equivalents. This increased resource requirement affects scalability and efficiency, especially in high-load scenarios. Despite their resistance to quantum attacks, post-quantum blockchains are still vulnerable to traditional attack vectors, as demonstrated by the significant computing cost seen throughout our testing. These research results underscore the need of balanced blockchain systems that successfully handle the trade-offs between security and performance.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Post-quantum security on the Lai-Massey scheme
    Zhang, Zhongya
    Wu, Wenling
    Sui, Han
    Wang, Bolin
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (08) : 2687 - 2704
  • [22] Evaluation of Post-Quantum Distributed Ledger Cryptography
    Campbell, Robert E., Sr.
    JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2019, 2 (01) : 17 - 24
  • [23] Performance Analysis of Post-Quantum Algorithms
    Lauterbach, Filip
    Burdiak, Patrik
    Richter, Filip
    Voznak, Miroslav
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [24] Blockchained Post-Quantum Signatures
    Chalkias, Konstantinos
    Brown, James
    Hearn, Mike
    Lillehagen, Tommy
    Nino, Igor
    Schroeter, Thomas
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1196 - 1203
  • [25] TUTORIAL: Post-Quantum Cryptography and 5G Security
    Clancy, T. Charles
    McGwier, Robert W.
    Chen, Lidong
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 285 - +
  • [26] Compact Ring Signatures with Post-Quantum Security in Standard Model
    Tuong Ngoc Nguyen
    Susilo, Willy
    Dung Hoang Duong
    Guo, Fuchun
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 65 - 84
  • [27] Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography
    Chamola, Vinay
    Jolfaei, Alireza
    Chanana, Vaibhav
    Parashari, Prakhar
    Hassija, Vikas
    COMPUTER COMMUNICATIONS, 2021, 176 : 99 - 118
  • [28] From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things
    Fernandez-Carames, Tiago M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6457 - 6480
  • [29] Post-quantum RSA
    Bernstein, Daniel J.
    Heninger, Nadia
    Lou, Paul
    Valenta, Luke
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 311 - 329
  • [30] Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions
    Gharavi, Hadi
    Granjal, Jorge
    Monteiro, Edmundo
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1748 - 1774