Authors :
David Shiala Ongoma; Wafula Muliaro; Dr. Tobias Mwalili
Volume/Issue :
Volume 10 - 2025, Issue 10 - October
Google Scholar :
https://tinyurl.com/bdd6cmjt
Scribd :
https://tinyurl.com/bdp7f2xh
DOI :
https://doi.org/10.38124/ijisrt/25oct1486
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The classic methods of encryption and ciphering techniques have a major threat due to the rapid growth of
quantum computing. This is particularly true for the Internet of Medical Things (IoMT) where sensitive patients’ data needs
to be protected in terms of confidentiality, integrity, and authenticity. RSA and ECC serve as two examples of public key
cryptographic algorithms that are highly vulnerable to quantum attacks especially the Shor’s and Grover’s algorithm. In
the context of resource constrained IoMT systems, this thesis proposes a new hash-based hybrid cryptographic algorithm
that is resilient to post-quantum cryptographic (PQC) attacks. In order to achieve resistance against quantum threats the
proposed method uses hash-based digital signatures such as XMSS, SPHINCS+, or symmetric encryption like AES-256 with
higher key sizes. In the Qiskit environment (Python, Anaconda Navigator, and Jupyter Notebook), Grover’s algorithm is
modeled to simulate quantum threats. The proposed method is tested through quantum circuit analysis to evaluate their
robustness. Our results will prove that the hybrid scheme, while remaining lightweight and suitable for real-time medical
applications, significantly lowers the efficiency gains of quantum attacks. The proposed method will bridge the gap between
the theoretical world of PQC and the practical world of IoMT networks, improving the long-term security and trust in
critical healthcare systems.
Keywords :
Post-Quantum Cryptography, Hash-Based Algorithms, Qiskit.
References :
- Chaubey, N. (2024). Advancing cyber security through quantum cryptography. IGI Global.
- Asif, R. (2021). Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. IoT, 2(1), 71–91. https://doi.org/10.3390/iot2010005
- Yadav, S. P., Singh, R., Yadav, V., Al-Turjman, F., & Kumar, S. A. (2023). Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity. Walter de Gruyter GmbH & Co KG.
- Septien-Hernandez, J., Arellano-Vazquez, M., Contreras-Cruz, M. A., & Ramirez-Paredes, J. (2022). A comparative study of Post-Quantum cryptosystems for Internet-of-Things applications. Sensors, 22(2), 489. https://doi.org/10.3390/s22020489
- Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey. Software Practice and Experience, 52(10), 2047–2076. https://doi.org/10.1002/spe.3121
- Irshad, R. R., Hussain, S., Hussain, I., Nasir, J. A., Zeb, A., Alalayah, K. M., Alattab, A. A., Yousif, A., & Alwayle, I. M. (2023). IoT-Enabled Secure and Scalable cloud Architecture for Multi-User Systems: a hybrid Post-Quantum cryptographic and Blockchain-Based approach toward a trustworthy cloud computing. IEEE Access, 11, 105479–105498. https://doi.org/10.1109/access.2023.3318755
- Hammoudeh, M., Alessa, A. T., Sherbeeni, A. M., Firth, C. M., & Alessa, A. S. (2024). Quantum computing: A Journey into the Next Frontier of Information and Communication Security. CRC Press.
- Althobaiti, O. S., & Dohler, M. (2020). Cybersecurity challenges associated with the internet of things in a Post-Quantum world. IEEE Access, 8, 157356–157381. https://doi.org/10.1109/access.2020.3019345
- Jain, K., & Krishnan, P. (2022). Analysis of Post-Quantum Cryptography for Internet of Things. 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 387–394. https://doi.org/10.1109/iciccs53718.2022.9787987
- Xu, F., Ma, X., Zhang, Q., Lo, H., & Pan, J. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2). https://doi.org/10.1103/revmodphys.92.025002
- Singh, S., Hosen, A. S. M. S., & Yoon, B. (2021). Blockchain security Attacks, challenges, and solutions for the future distributed IoT network. IEEE Access, 9, 13938–13959. https://doi.org/10.1109/access.2021.3051602
- Lilhore, U. K., Dalal, S., Dutt, V., & Radulescu, M. (2024). Industrial Quantum Computing: Algorithms, Blockchains, Industry 4.0. Walter de Gruyter GmbH & Co KG.
- Siljak, H., Joshi, H. D., & Magarini, M. (2021). Quantum Internet—Applications, functionalities, enabling technologies, challenges, and research directions. IEEE Communications Surveys & Tutorials, 23(4), 2218–2247. https://doi.org/10.1109/comst.2021.3109944
- Suhail, S., Hussain, R., Khan, A., & Hong, C. S. (2020). On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. IEEE Internet of Things Journal, 8(1), 1–17. https://doi.org/10.1109/jiot.2020.3013019
- Fernandez-Carames, T. M. (2019). From Pre-Quantum to Post-Quantum IoT Security: A survey on Quantum-Resistant Cryptosystems for the Internet of Things. IEEE Internet of Things Journal, 7(7), 6457–6480. https://doi.org/10.1109/jiot.2019.2958788
- Tyagi, A. K. (2023). Handbook of Research on Quantum Computing for Smart Environments. IGI Global.
- Chalouf, M. (2022). Intelligent security management and control in the IoT. John Wiley & Sons.
- Tripathi, S. L., & Verma, S. B. (2023). Emerging trends in IoT and computing technologies: Proceedings of International Conference on Emerging Trends in IoT and Computing Technologies - 2022 (ICEICT-2022), Goel Institute of Technology & Management Lucknow, India. Taylor & Francis.
- Sharma, A. K., Peelam, M. S., Chauasia, B. K., & Chamola, V. (2023). QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0. IET Blockchain, 4(3), 252–262. https://doi.org/10.1049/blc2.12059
- Jones, P. (2025). IoT Security Mastery: Essential Best practices for the Internet of Things. Walzone Press.
The classic methods of encryption and ciphering techniques have a major threat due to the rapid growth of
quantum computing. This is particularly true for the Internet of Medical Things (IoMT) where sensitive patients’ data needs
to be protected in terms of confidentiality, integrity, and authenticity. RSA and ECC serve as two examples of public key
cryptographic algorithms that are highly vulnerable to quantum attacks especially the Shor’s and Grover’s algorithm. In
the context of resource constrained IoMT systems, this thesis proposes a new hash-based hybrid cryptographic algorithm
that is resilient to post-quantum cryptographic (PQC) attacks. In order to achieve resistance against quantum threats the
proposed method uses hash-based digital signatures such as XMSS, SPHINCS+, or symmetric encryption like AES-256 with
higher key sizes. In the Qiskit environment (Python, Anaconda Navigator, and Jupyter Notebook), Grover’s algorithm is
modeled to simulate quantum threats. The proposed method is tested through quantum circuit analysis to evaluate their
robustness. Our results will prove that the hybrid scheme, while remaining lightweight and suitable for real-time medical
applications, significantly lowers the efficiency gains of quantum attacks. The proposed method will bridge the gap between
the theoretical world of PQC and the practical world of IoMT networks, improving the long-term security and trust in
critical healthcare systems.
Keywords :
Post-Quantum Cryptography, Hash-Based Algorithms, Qiskit.