{"id":"https://openalex.org/W7131672580","doi":"https://doi.org/10.3390/cryptography10020015","title":"Performance Evaluation of NIST-Standardized Post-Quantum and Symmetric Ciphers for Mitigating Deepfakes","display_name":"Performance Evaluation of NIST-Standardized Post-Quantum and Symmetric Ciphers for Mitigating Deepfakes","publication_year":2026,"publication_date":"2026-02-26","ids":{"openalex":"https://openalex.org/W7131672580","doi":"https://doi.org/10.3390/cryptography10020015"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10020015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020015","pdf_url":"https://www.mdpi.com/2410-387X/10/2/15/pdf?version=1772095538","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/2/15/pdf?version=1772095538","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101259220","display_name":"Mohammad Alkhatib","orcid":null},"institutions":[{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"education","lineage":["https://openalex.org/I240666556"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammad Alkhatib","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11623, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-9922-6645","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11623, Saudi Arabia","institution_ids":["https://openalex.org/I240666556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101259220"],"corresponding_institution_ids":["https://openalex.org/I240666556"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34226838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"15","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5756000280380249,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5756000280380249,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.12540000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.04859999939799309,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.6682000160217285},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6568999886512756},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6126999855041504},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5073000192642212},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4830000102519989},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4544000029563904},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.3856000006198883},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.3774999976158142}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7157999873161316},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.6682000160217285},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6568999886512756},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6126999855041504},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5073000192642212},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49720001220703125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4830000102519989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.482699990272522},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4544000029563904},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.3856000006198883},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.3774999976158142},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.3711000084877014},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.353300005197525},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.3447999954223633},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.3337000012397766},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28049999475479126}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10020015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020015","pdf_url":"https://www.mdpi.com/2410-387X/10/2/15/pdf?version=1772095538","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f293264ffc8a4c8cad23b14b594bbbc5","is_oa":true,"landing_page_url":"https://doaj.org/article/f293264ffc8a4c8cad23b14b594bbbc5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 2, p 15 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10020015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020015","pdf_url":"https://www.mdpi.com/2410-387X/10/2/15/pdf?version=1772095538","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5636401176452637}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7131672580.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W2013613544","https://openalex.org/W2808402081","https://openalex.org/W2919115771","https://openalex.org/W2920877282","https://openalex.org/W2962770929","https://openalex.org/W2970868842","https://openalex.org/W2995481985","https://openalex.org/W3019200173","https://openalex.org/W3024222102","https://openalex.org/W3034577585","https://openalex.org/W3035574324","https://openalex.org/W3046827028","https://openalex.org/W3084142230","https://openalex.org/W3088210628","https://openalex.org/W4213030755","https://openalex.org/W4232836212","https://openalex.org/W4285226122","https://openalex.org/W4285791495","https://openalex.org/W4288099671","https://openalex.org/W4292411471","https://openalex.org/W4297988790","https://openalex.org/W4307955901","https://openalex.org/W4312098003","https://openalex.org/W4313451502","https://openalex.org/W4319601736","https://openalex.org/W4362502041","https://openalex.org/W4362682654","https://openalex.org/W4366492352","https://openalex.org/W4375955734","https://openalex.org/W4381123984","https://openalex.org/W4386502488","https://openalex.org/W4389094476","https://openalex.org/W4390235290","https://openalex.org/W4393154086","https://openalex.org/W4395673009","https://openalex.org/W4399049402","https://openalex.org/W4399261550","https://openalex.org/W4399324114","https://openalex.org/W4401046657","https://openalex.org/W4401426400","https://openalex.org/W4401751796","https://openalex.org/W4402264364","https://openalex.org/W4402827535","https://openalex.org/W4404345434","https://openalex.org/W4404888310","https://openalex.org/W4405377921","https://openalex.org/W4406325044","https://openalex.org/W4410320635","https://openalex.org/W4411804757","https://openalex.org/W4413068452"],"related_works":[],"abstract_inverted_index":{"Deepfake":[0],"technology":[1],"can":[2,99],"produce":[3],"highly":[4],"realistic":[5],"manipulated":[6],"media":[7,89,112],"which":[8,43],"pose":[9],"as":[10,251,267],"significant":[11,235],"cybersecurity":[12],"threats,":[13],"including":[14,48,142],"fraud,":[15],"misinformation,":[16],"and":[17,30,51,61,136,146,158,165,172,185,228,256,261],"privacy":[18],"violations.":[19],"This":[20],"research":[21,150],"proposes":[22],"a":[23,180,203,234,268],"deepfake":[24,126,283],"prevention":[25],"approach":[26,83],"based":[27],"on":[28,94],"symmetric":[29,135,164,213,248,260],"asymmetric":[31,34,137,262],"ciphers.":[32],"Post-quantum":[33],"ciphers":[35,54,65,76,119,138,160,275],"were":[36,55],"utilized":[37],"to":[38,58,69,77,86,120,212,225,246,270,276],"perform":[39,121,226,277],"digital":[40,190,207],"signature":[41,191,208],"operations,":[42],"offer":[44,78],"essential":[45],"security":[46],"services,":[47],"integrity,":[49],"authentication,":[50],"non-repudiation.":[52],"Symmetric":[53],"also":[56,196],"employed":[57],"provide":[59],"confidentiality":[60],"authentication.":[62],"Unlike":[63],"classical":[64,157],"that":[66,170],"are":[67],"vulnerable":[68],"quantum":[70],"attacks,":[71],"this":[72,149,264],"study":[73,129,265],"adopts":[74],"quantum-resilient":[75,134],"long-term":[79],"security.":[80],"The":[81,193],"proposed":[82],"enables":[84],"entities":[85],"digitally":[87],"sign":[88],"content":[90,105],"before":[91],"public":[92,108],"release":[93],"other":[95,176],"platforms.":[96],"End":[97],"users":[98],"subsequently":[100],"verify":[101],"the":[102,107,111,116,128,131,155,217,272,278],"authenticity":[103],"of":[104,110,133,183,258],"using":[106],"keys":[109],"creators.":[113],"To":[114],"identify":[115,271],"most":[117,273],"efficient":[118,274],"cryptography":[122,279],"operations":[123,280],"required":[124],"for":[125,189,206,237,282],"prevention,":[127],"explores":[130],"implementation":[132],"standardized":[139],"by":[140],"NIST,":[141],"Dilithium,":[143],"Falcon,":[144],"SPHINCS+,":[145],"Ascon-80pq.":[147],"Additionally,":[148],"provides":[151],"comprehensive":[152,254],"comparisons":[153,257],"between":[154],"various":[156,259],"post-quantum":[159,177],"in":[161],"both":[162],"categories:":[163],"asymmetric.":[166],"Experimental":[167],"results":[168],"revealed":[169],"Dilithium-5":[171],"Falcon-512":[173,194],"algorithms":[174],"outperform":[175],"ciphers,":[178,214,249,263],"with":[179],"time":[181,219],"delay":[182],"2.50":[184],"251":[186],"ms,":[187],"respectively,":[188],"operations.":[192,209,230],"algorithm":[195],"demonstrates":[197],"superior":[198],"resource":[199],"efficiency,":[200],"making":[201],"it":[202,232,241],"cost-effective":[204],"choice":[205],"With":[210],"respect":[211],"Ascon-80pq":[215],"achieved":[216],"lowest":[218],"consumption,":[220],"taking":[221],"just":[222],"0.015":[223],"ms":[224],"encryption":[227],"decryption":[229],"Also,":[231],"is":[233],"option":[236],"constrained":[238],"devices,":[239],"since":[240],"consumes":[242],"fewer":[243],"resources":[244],"compared":[245],"standard":[247],"such":[250],"AES.":[252],"Through":[253],"evaluations":[255],"serves":[266],"blueprint":[269],"necessary":[281],"prevention.":[284]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-27T00:00:00"}
