A reproducible research notebook providing a structured security and performance analysis of hybrid post-quantum cryptographic architectures combining:
- ML-KEM (CRYSTALS-Kyber, NIST standardized)
- HKDF (NIST-compliant key derivation)
- AES-256-GCM authenticated encryption
This study evaluates security parameter harmonization and performance implications under explicit quantum adversary models.
- Abstract
- Threat Model
- Shor’s Algorithm and Its Impact on RSA
- Grover’s Algorithm and Its Impact on AES
- CRYSTALS-Kyber Overview
- Hybrid Architecture Design
- Implementation
- Performance Benchmark
- Discussion
- Conclusion
- References
This project is licensed under the Apache License, Version 2.0.
You may obtain a copy of the License at:
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, this software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the LICENSE file for details.