Skip to content

koraydns/post-quantum-hybrid-security-analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Post-Quantum Hybrid Security Analysis

A reproducible research notebook providing a structured security and performance analysis of hybrid post-quantum cryptographic architectures combining:

  • ML-KEM (CRYSTALS-Kyber, NIST standardized)
  • HKDF (NIST-compliant key derivation)
  • AES-256-GCM authenticated encryption

This study evaluates security parameter harmonization and performance implications under explicit quantum adversary models.

Notebook Structure

  1. Abstract
  2. Threat Model
  3. Shor’s Algorithm and Its Impact on RSA
  4. Grover’s Algorithm and Its Impact on AES
  5. CRYSTALS-Kyber Overview
  6. Hybrid Architecture Design
  7. Implementation
  8. Performance Benchmark
  9. Discussion
  10. Conclusion
  11. References

License

This project is licensed under the Apache License, Version 2.0.
You may obtain a copy of the License at:

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, this software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the LICENSE file for details.

About

Security harmonization and performance analysis of ML-KEM + AES hybrid architectures under quantum adversary models.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors