🤖 AI Summary
Quantum computing poses a significant threat to classical cryptographic protocols based on RSA and elliptic curve cryptography, necessitating a systematic assessment of their vulnerabilities and post-quantum migration pathways. This study presents the first comprehensive comparison of structural barriers and deployment disparities across nine widely used protocols—including TLS, IPsec, and BGP—during post-quantum transitions. Drawing on both literature review and empirical analysis, it examines hybrid key exchange mechanisms, standardization progress, and real-world deployment cases. The findings reveal that key exchange generally proves more amenable to migration than authentication; TLS and Signal have already achieved large-scale hybrid deployments, whereas DNSSEC and BGP confront fundamental challenges due to signature size constraints. Crucially, message size and fragmentation limitations emerge as more critical bottlenecks than algorithmic performance.
📝 Abstract
The advent of quantum computing poses significant threats to classical public-key cryptographic primitives such as RSA and elliptic-curve cryptography. As many critical network and security protocols depend on these primitives for key exchange and authentication, there is an urgent need to understand their quantum vulnerability and assess the progress made towards integrating post-quantum cryptography (PQC). This survey provides a detailed examination of nine widely deployed protocols - TLS, IPsec, BGP, DNSSEC, SSH, QUIC, OpenID Connect, OpenVPN, and Signal Protocol - analysing their cryptographic foundations, quantum risks, and the current state of PQC migration. We find that TLS and Signal lead the transition with hybrid post-quantum key exchange already deployed at scale, while IPsec and SSH have standardised mechanisms but lack widespread production adoption. DNSSEC and BGP face the most significant structural barriers, as post-quantum signature sizes conflict with fundamental protocol constraints. Across all protocols, key exchange proves consistently easier to migrate than authentication, and protocol-level limitations such as message size and fragmentation often dominate over raw algorithm performance. We also discuss experimental deployments and emerging standards that are shaping the path towards a quantum-resistant communication infrastructure.