Study of Post Quantum status of Widely Used Protocols

2026-03-30Networking and Internet Architecture

Networking and Internet Architecture
AI summary

The authors study nine common security protocols to see how they might be affected by future quantum computers, which can break current encryption methods. They find some protocols like TLS and Signal are already starting to use new quantum-safe techniques for exchanging keys, but others like IPsec, SSH, DNSSEC, and BGP face bigger challenges. Especially, signing and authentication are harder to update than key exchange, often because of limits like message size. The authors also highlight ongoing experiments and new rules that will help build safer communication systems resistant to quantum attacks.

quantum computingpost-quantum cryptographypublic-key cryptographyTLSIPsecDNSSECkey exchangeauthenticationdigital signaturesprotocol migration
Authors
Tushin Mallick, Ashish Kundu, Ramana Kompella
Abstract
The advent of quantum computing poses significant threats to classical public-key cryptographic primitives such as RSA and elliptic-curve cryptography. As many critical network and security protocols depend on these primitives for key exchange and authentication, there is an urgent need to understand their quantum vulnerability and assess the progress made towards integrating post-quantum cryptography (PQC). This survey provides a detailed examination of nine widely deployed protocols - TLS, IPsec, BGP, DNSSEC, SSH, QUIC, OpenID Connect, OpenVPN, and Signal Protocol - analysing their cryptographic foundations, quantum risks, and the current state of PQC migration. We find that TLS and Signal lead the transition with hybrid post-quantum key exchange already deployed at scale, while IPsec and SSH have standardised mechanisms but lack widespread production adoption. DNSSEC and BGP face the most significant structural barriers, as post-quantum signature sizes conflict with fundamental protocol constraints. Across all protocols, key exchange proves consistently easier to migrate than authentication, and protocol-level limitations such as message size and fragmentation often dominate over raw algorithm performance. We also discuss experimental deployments and emerging standards that are shaping the path towards a quantum-resistant communication infrastructure.