{"id":"https://openalex.org/W7147137698","doi":"https://doi.org/10.48550/arxiv.2603.28728","title":"Study of Post Quantum status of Widely Used Protocols","display_name":"Study of Post Quantum status of Widely Used Protocols","publication_year":2026,"publication_date":"2026-03-30","ids":{"openalex":"https://openalex.org/W7147137698","doi":"https://doi.org/10.48550/arxiv.2603.28728"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.28728","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28728","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.28728","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052748714","display_name":"Tushin Mallick","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mallick, Tushin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132680174","display_name":"Ashish Kundu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kundu, Ashish","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5071146373","display_name":"Ramana Rao Kompella","orcid":"https://orcid.org/0000-0002-7559-8997"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kompella, Ramana","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052748714"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.18520000576972961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.18520000576972961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13748","display_name":"Advanced Statistical Modeling Techniques","score":0.1800999939441681,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.08839999884366989,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6870999932289124},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5591999888420105},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5504999756813049},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5498999953269958},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5038999915122986},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4966999888420105},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49059998989105225},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4799000024795532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7429999709129333},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6870999932289124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5738999843597412},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5591999888420105},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5504999756813049},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5498999953269958},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5038999915122986},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4966999888420105},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49059998989105225},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4799000024795532},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.3806000053882599},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37630000710487366},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.35580000281333923},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28610000014305115},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2720000147819519},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.26409998536109924},{"id":"https://openalex.org/C203087015","wikidata":"https://www.wikidata.org/wiki/Q378201","display_name":"Qubit","level":3,"score":0.2590999901294708},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.2567000091075897},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.25589999556541443},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.28728","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28728","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.28728","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28728","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6310221552848816,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"advent":[1],"of":[2,61,90],"quantum":[3,43,84],"computing":[4],"poses":[5],"significant":[6,129],"threats":[7],"to":[8,40,149],"classical":[9],"public-key":[10],"cryptographic":[11,82],"primitives":[12,29],"such":[13,156],"as":[14,132,157],"RSA":[15],"and":[16,23,33,45,76,86,97,113,124,153,160,173],"elliptic-curve":[17],"cryptography.":[18],"As":[19],"many":[20],"critical":[21],"network":[22],"security":[24],"protocols":[25,65],"depend":[26],"on":[27],"these":[28],"for":[30],"key":[31,105,144],"exchange":[32,106,145],"authentication,":[34,152],"there":[35],"is":[36],"an":[37],"urgent":[38],"need":[39],"understand":[41],"their":[42,81],"vulnerability":[44],"assess":[46],"the":[47,87,100,127,179],"progress":[48],"made":[49],"towards":[50,181],"integrating":[51],"post-quantum":[52,104,133],"cryptography":[53],"(PQC).":[54],"This":[55],"survey":[56],"provides":[57],"a":[58,182],"detailed":[59],"examination":[60],"nine":[62],"widely":[63],"deployed":[64,108],"-":[66,79],"TLS,":[67],"IPsec,":[68],"BGP,":[69],"DNSSEC,":[70],"SSH,":[71],"QUIC,":[72],"OpenID":[73],"Connect,":[74],"OpenVPN,":[75],"Signal":[77,98],"Protocol":[78],"analysing":[80],"foundations,":[83],"risks,":[85],"current":[88],"state":[89],"PQC":[91],"migration.":[92],"We":[93,168],"find":[94],"that":[95,176],"TLS":[96],"lead":[99],"transition":[101],"with":[102,137],"hybrid":[103],"already":[107],"at":[109],"scale,":[110],"while":[111],"IPsec":[112],"SSH":[114],"have":[115],"standardised":[116],"mechanisms":[117],"but":[118],"lack":[119],"widespread":[120],"production":[121],"adoption.":[122],"DNSSEC":[123],"BGP":[125],"face":[126],"most":[128],"structural":[130],"barriers,":[131],"signature":[134],"sizes":[135],"conflict":[136],"fundamental":[138],"protocol":[139],"constraints.":[140],"Across":[141],"all":[142],"protocols,":[143],"proves":[146],"consistently":[147],"easier":[148],"migrate":[150],"than":[151],"protocol-level":[154],"limitations":[155],"message":[158],"size":[159],"fragmentation":[161],"often":[162],"dominate":[163],"over":[164],"raw":[165],"algorithm":[166],"performance.":[167],"also":[169],"discuss":[170],"experimental":[171],"deployments":[172],"emerging":[174],"standards":[175],"are":[177],"shaping":[178],"path":[180],"quantum-resistant":[183],"communication":[184],"infrastructure.":[185]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
