Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/21860
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | NEGI, SAURABH | - |
dc.date.accessioned | 2025-07-08T08:50:25Z | - |
dc.date.available | 2025-07-08T08:50:25Z | - |
dc.date.issued | 2025-05 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/21860 | - |
dc.description.abstract | This thesis focuses on how current cryptography performs against quantum attacks, titled "Quantum-Resilient Cryptography: A Comparative Analysis and Plan for Migration to Cloud Systems." The publication focuses on the weaknesses of traditional cryptography algorithms under Shor’s and Grover’s algorithms and presents some PQC alternatives such as lattice-based, code-based and hash-based solutions. A new framework, QRAM (Quantum-Resilient Architecture for Migration), is presented to help cloud systems add quantum-safe algorithms while staying secure. To do this, analysis of classic algorithms such as RSA, ECC and AES for weaknesses is performed, simulation and assessment of Round 3 NIST PQC models is included and new hybrid models are designed. In addition, BB84, E91 and B92 are modeled to check how efficiently they detect errors and any attempts at eavesdropping. Each protocol is examined in different attack conditions, mainly concerning channel security and promises provided by information theory. Simulations confirm that QKD is a possible additional secure channel for cloud environments. According to the findings, lattice-based systems Kyber and Dilithium provide both strong security and satisfactory performance, while QKD methods are strongly protected against eavesdropping because of quantum features. The QRAM blueprint supports practical actions for adding post-quantum security to real-life cloud environments. The study finds that by using informed algorithms, carrying out migration in steps and adding QKD solutions, cloud infrastructures will operate securely even after quantum computers exist. Researchers can work on making blockchain applications quantum-safe, improving hardware with QKD and testing its use in the cloud in real time. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD-8083; | - |
dc.subject | QUANTUM-RESILIENT CRYPTOGRAPHY | en_US |
dc.subject | COMPARATIVE ANALYSIS | en_US |
dc.subject | MIGRATION BLUEPRINT | en_US |
dc.subject | CLOUD ENVIRONMENTS | en_US |
dc.title | QUANTUM-RESILIENT CRYPTOGRAPHY: COMPARATIVE ANALYSIS AND MIGRATION BLUEPRINT FOR CLOUD ENVIRONMENTS | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SAURABH NEGI M.Tech..pdf | 1.19 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.