April 15, 2024, 4:10 a.m. | Yaser Baseri, Vikas Chouhan, Abdelhakim Hafid

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.08232v1 Announce Type: new
Abstract: The emergence of quantum computing poses a formidable security challenge to network protocols traditionally safeguarded by classical cryptographic algorithms. This paper provides an exhaustive analysis of vulnerabilities introduced by quantum computing in a diverse array of widely utilized security protocols across the layers of the TCP/IP model, including TLS, IPsec, SSH, PGP, and more. Our investigation focuses on precisely identifying vulnerabilities susceptible to exploitation by quantum adversaries at various migration stages for each protocol while …

algorithms analysis array arxiv challenge computing cryptographic cryptographic algorithms cs.cr environments network protocols quantum quantum computing quantum-safe quantum security risks safe security security protocols security risks study vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Engineer, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

BaaN IV Techno-functional consultant-On-Balfour

@ Marlabs | Piscataway, US

Senior Security Analyst

@ BETSOL | Bengaluru, India

Security Operations Centre Operator

@ NEXTDC | West Footscray, Australia

Senior Network and Security Research Officer

@ University of Toronto | Toronto, ON, CA