Design and Simulation of a Hybrid Hash-Based Algorithm to Mitigate Post-Quantum Cryptography Attacks in Internet of Medical Things


Authors : David Shiala Ongoma; Wafula Muliaro; Dr. Tobias Mwalili

Volume/Issue : Volume 10 - 2025, Issue 10 - October


Google Scholar : https://tinyurl.com/bdd6cmjt

Scribd : https://tinyurl.com/bdp7f2xh

DOI : https://doi.org/10.38124/ijisrt/25oct1486

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : The classic methods of encryption and ciphering techniques have a major threat due to the rapid growth of quantum computing. This is particularly true for the Internet of Medical Things (IoMT) where sensitive patients’ data needs to be protected in terms of confidentiality, integrity, and authenticity. RSA and ECC serve as two examples of public key cryptographic algorithms that are highly vulnerable to quantum attacks especially the Shor’s and Grover’s algorithm. In the context of resource constrained IoMT systems, this thesis proposes a new hash-based hybrid cryptographic algorithm that is resilient to post-quantum cryptographic (PQC) attacks. In order to achieve resistance against quantum threats the proposed method uses hash-based digital signatures such as XMSS, SPHINCS+, or symmetric encryption like AES-256 with higher key sizes. In the Qiskit environment (Python, Anaconda Navigator, and Jupyter Notebook), Grover’s algorithm is modeled to simulate quantum threats. The proposed method is tested through quantum circuit analysis to evaluate their robustness. Our results will prove that the hybrid scheme, while remaining lightweight and suitable for real-time medical applications, significantly lowers the efficiency gains of quantum attacks. The proposed method will bridge the gap between the theoretical world of PQC and the practical world of IoMT networks, improving the long-term security and trust in critical healthcare systems.

Keywords : Post-Quantum Cryptography, Hash-Based Algorithms, Qiskit.

References :

  1. Chaubey, N. (2024). Advancing cyber security through quantum cryptography. IGI Global.
  2. Asif, R. (2021). Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. IoT, 2(1), 71–91. https://doi.org/10.3390/iot2010005
  3. Yadav, S. P., Singh, R., Yadav, V., Al-Turjman, F., & Kumar, S. A. (2023). Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity. Walter de Gruyter GmbH & Co KG.
  4. Septien-Hernandez, J., Arellano-Vazquez, M., Contreras-Cruz, M. A., & Ramirez-Paredes, J. (2022). A comparative study of Post-Quantum cryptosystems for Internet-of-Things applications. Sensors, 22(2), 489. https://doi.org/10.3390/s22020489
  5. Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey. Software Practice and Experience, 52(10), 2047–2076. https://doi.org/10.1002/spe.3121
  6. Irshad, R. R., Hussain, S., Hussain, I., Nasir, J. A., Zeb, A., Alalayah, K. M., Alattab, A. A., Yousif, A., & Alwayle, I. M. (2023). IoT-Enabled Secure and Scalable cloud Architecture for Multi-User Systems: a hybrid Post-Quantum cryptographic and Blockchain-Based approach toward a trustworthy cloud computing. IEEE Access, 11, 105479–105498. https://doi.org/10.1109/access.2023.3318755
  7. Hammoudeh, M., Alessa, A. T., Sherbeeni, A. M., Firth, C. M., & Alessa, A. S. (2024). Quantum computing: A Journey into the Next Frontier of Information and Communication Security. CRC Press.
  8. Althobaiti, O. S., & Dohler, M. (2020). Cybersecurity challenges associated with the internet of things in a Post-Quantum world. IEEE Access, 8, 157356–157381. https://doi.org/10.1109/access.2020.3019345
  9. Jain, K., & Krishnan, P. (2022). Analysis of Post-Quantum Cryptography for Internet of Things. 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 387–394. https://doi.org/10.1109/iciccs53718.2022.9787987
  10. Xu, F., Ma, X., Zhang, Q., Lo, H., & Pan, J. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2). https://doi.org/10.1103/revmodphys.92.025002
  11. Singh, S., Hosen, A. S. M. S., & Yoon, B. (2021). Blockchain security Attacks, challenges, and solutions for the future distributed IoT network. IEEE Access, 9, 13938–13959. https://doi.org/10.1109/access.2021.3051602
  12. Lilhore, U. K., Dalal, S., Dutt, V., & Radulescu, M. (2024). Industrial Quantum Computing: Algorithms, Blockchains, Industry 4.0. Walter de Gruyter GmbH & Co KG.
  13. Siljak, H., Joshi, H. D., & Magarini, M. (2021). Quantum Internet—Applications, functionalities, enabling technologies, challenges, and research directions. IEEE Communications Surveys & Tutorials, 23(4), 2218–2247. https://doi.org/10.1109/comst.2021.3109944
  14. Suhail, S., Hussain, R., Khan, A., & Hong, C. S. (2020). On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. IEEE Internet of Things Journal, 8(1), 1–17. https://doi.org/10.1109/jiot.2020.3013019
  15. Fernandez-Carames, T. M. (2019). From Pre-Quantum to Post-Quantum IoT Security: A survey on Quantum-Resistant Cryptosystems for the Internet of Things. IEEE Internet of Things Journal, 7(7), 6457–6480. https://doi.org/10.1109/jiot.2019.2958788
  16. Tyagi, A. K. (2023). Handbook of Research on Quantum Computing for Smart Environments. IGI Global.
  17. Chalouf, M. (2022). Intelligent security management and control in the IoT. John Wiley & Sons.
  18. Tripathi, S. L., & Verma, S. B. (2023). Emerging trends in IoT and computing technologies: Proceedings of International Conference on Emerging Trends in IoT and Computing Technologies - 2022 (ICEICT-2022), Goel Institute of Technology & Management Lucknow, India. Taylor & Francis.
  19. Sharma, A. K., Peelam, M. S., Chauasia, B. K., & Chamola, V. (2023). QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0. IET Blockchain, 4(3), 252–262. https://doi.org/10.1049/blc2.12059
  20. Jones, P. (2025). IoT Security Mastery: Essential Best practices for the Internet of Things. Walzone Press.

The classic methods of encryption and ciphering techniques have a major threat due to the rapid growth of quantum computing. This is particularly true for the Internet of Medical Things (IoMT) where sensitive patients’ data needs to be protected in terms of confidentiality, integrity, and authenticity. RSA and ECC serve as two examples of public key cryptographic algorithms that are highly vulnerable to quantum attacks especially the Shor’s and Grover’s algorithm. In the context of resource constrained IoMT systems, this thesis proposes a new hash-based hybrid cryptographic algorithm that is resilient to post-quantum cryptographic (PQC) attacks. In order to achieve resistance against quantum threats the proposed method uses hash-based digital signatures such as XMSS, SPHINCS+, or symmetric encryption like AES-256 with higher key sizes. In the Qiskit environment (Python, Anaconda Navigator, and Jupyter Notebook), Grover’s algorithm is modeled to simulate quantum threats. The proposed method is tested through quantum circuit analysis to evaluate their robustness. Our results will prove that the hybrid scheme, while remaining lightweight and suitable for real-time medical applications, significantly lowers the efficiency gains of quantum attacks. The proposed method will bridge the gap between the theoretical world of PQC and the practical world of IoMT networks, improving the long-term security and trust in critical healthcare systems.

Keywords : Post-Quantum Cryptography, Hash-Based Algorithms, Qiskit.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe