{"id":"https://openalex.org/W7153023439","doi":"https://doi.org/10.48550/arxiv.2604.08480","title":"Post-Quantum Cryptographic Analysis of Message Transformations Across the Network Stack","display_name":"Post-Quantum Cryptographic Analysis of Message Transformations Across the Network Stack","publication_year":2026,"publication_date":"2026-04-09","ids":{"openalex":"https://openalex.org/W7153023439","doi":"https://doi.org/10.48550/arxiv.2604.08480"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.08480","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.08480","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.08480","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133369067","display_name":"Ashish Kundu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kundu, Ashish","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066165817","display_name":"Vishal Chakraborty","orcid":"https://orcid.org/0000-0002-0997-4149"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chakraborty, Vishal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133393841","display_name":"Ramana Kompella","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kompella, Ramana","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5133369067"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4747999906539917,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4747999906539917,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.10010000318288803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.09019999951124191,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6111000180244446},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.557699978351593},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5565999746322632},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5533000230789185},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.531000018119812},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4902999997138977},{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.4260999858379364},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.42160001397132874},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41830000281333923},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4140999913215637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7642999887466431},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6111000180244446},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.557699978351593},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5565999746322632},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5533000230789185},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.531000018119812},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4902999997138977},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46549999713897705},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4399999976158142},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.4260999858379364},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.42160001397132874},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41830000281333923},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4140999913215637},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.3887999951839447},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.38109999895095825},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.364300012588501},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3255999982357025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3203999996185303},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3192000091075897},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3131999969482422},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.30550000071525574},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.29840001463890076},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.2750000059604645},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.2728999853134155},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.26739999651908875},{"id":"https://openalex.org/C180073179","wikidata":"https://www.wikidata.org/wiki/Q3304359","display_name":"Secure channel","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.2565999925136566},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.25519999861717224},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.08480","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.08480","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.08480","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.08480","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4577486217021942,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"When":[0],"a":[1,4,7,82,130,179],"user":[2],"sends":[3],"message":[5,11,121],"over":[6],"wireless":[8],"network,":[9],"the":[10,26,30,34,62,73,119,137,144,149,201],"does":[12],"not":[13,66],"travel":[14],"as-is.":[15],"It":[16],"is":[17],"encrypted,":[18],"authenticated,":[19],"encapsulated,":[20],"and":[21,49,124,141,157,160,177,195],"transformed":[22],"as":[23],"it":[24],"descends":[25],"protocol":[27],"stack":[28],"from":[29],"application":[31],"layer":[32,38,70,182,189],"to":[33,56,94,151],"physical":[35],"medium.":[36],"Each":[37],"may":[39],"apply":[40,148],"its":[41,46],"own":[42,47],"cryptographic":[43,90,96,103],"operations":[44],"using":[45],"algorithms,":[48],"these":[50,88],"algorithms":[51],"differ":[52],"in":[53],"their":[54],"vulnerability":[55,110],"quantum":[57,109],"computers.":[58],"The":[59],"security":[60],"of":[61,75,107],"overall":[63],"communication":[64,153],"depends":[65,198],"on":[67,72,200],"any":[68],"single":[69,180],"but":[71,187],"\\emph{composition}":[74],"transformations":[76,91],"across":[77,118],"all":[78],"layers.":[79],"We":[80,99,147],"develop":[81],"preliminary":[83],"formal":[84],"framework":[85,150],"for":[86,184,192],"analyzing":[87],"cross-layer":[89],"with":[92,133],"respect":[93],"post-quantum":[95,181],"(PQC)":[97],"readiness.":[98],"classify":[100],"every":[101],"per-layer":[102,114],"operation":[104],"into":[105],"one":[106],"four":[108],"categories,":[111],"define":[112],"how":[113],"PQC":[115,172],"statuses":[116],"compose":[117],"full":[120],"transformation":[122],"chain,":[123],"prove":[125],"that":[126],"this":[127],"composition":[128],"forms":[129],"bounded":[131],"lattice":[132],"confidentiality":[134,186],"composing":[135],"via":[136,143],"join":[138],"(max)":[139],"operator":[140],"authentication":[142],"meet":[145],"(min).":[146],"five":[152],"scenarios":[154],"spanning":[155],"Linux":[156],"iOS":[158],"platforms,":[159],"identify":[161],"several":[162],"research":[163],"challenges.":[164],"Among":[165],"our":[166],"findings:":[167],"WPA2-Personal":[168],"provides":[169],"strictly":[170],"better":[171],"posture":[173],"than":[174],"both":[175],"WPA3-Personal":[176],"WPA2-Enterprise;":[178],"suffices":[183],"payload":[185],"\\emph{every}":[188],"must":[190],"migrate":[191],"complete":[193],"authentication;":[194],"metadata":[196],"protection":[197],"solely":[199],"outermost":[202],"layer.":[203]},"counts_by_year":[],"updated_date":"2026-04-11T06:19:08.300824","created_date":"2026-04-11T00:00:00"}
