🤖 AI Summary
This study addresses the compounded security risks arising from multi-layer encryption in network protocol stacks under post-quantum threat models. It presents the first cross-layer cryptographic transformation framework based on lattice-theoretic structures, formally characterizing the quantum vulnerabilities of individual layers and their compositional effects on confidentiality and authentication. Leveraging quantum vulnerability classification, lattice operations (join and meet), and cross-platform protocol stack analysis (Linux/iOS), the work demonstrates that end-to-end confidentiality is dictated by the weakest (most quantum-vulnerable) layer, whereas authentication requires post-quantum security across the entire stack. Notably, WPA2-Personal exhibits stronger practical post-quantum security than both WPA3-Personal and WPA2-Enterprise. While single-layer post-quantum encryption suffices to protect payload confidentiality, metadata protection depends solely on the outermost layer.
📝 Abstract
When a user sends a message over a wireless network, the message does not travel as-is. It is encrypted, authenticated, encapsulated, and transformed as it descends the protocol stack from the application layer to the physical medium. Each layer may apply its own cryptographic operations using its own algorithms, and these algorithms differ in their vulnerability to quantum computers. The security of the overall communication depends not on any single layer but on the \emph{composition} of transformations across all layers.
We develop a preliminary formal framework for analyzing these cross-layer cryptographic transformations with respect to post-quantum cryptographic (PQC) readiness. We classify every per-layer cryptographic operation into one of four quantum vulnerability categories, define how per-layer PQC statuses compose across the full message transformation chain, and prove that this composition forms a bounded lattice with confidentiality composing via the join (max) operator and authentication via the meet (min). We apply the framework to five communication scenarios spanning Linux and iOS platforms, and identify several research challenges. Among our findings: WPA2-Personal provides strictly better PQC posture than both WPA3-Personal and WPA2-Enterprise; a single post-quantum layer suffices for payload confidentiality but \emph{every} layer must migrate for complete authentication; and metadata protection depends solely on the outermost layer.